General
-
Target
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623
-
Size
5.0MB
-
Sample
220614-21qhqshbgq
-
MD5
3340eec1f90de20b798e5f6c2a7b6434
-
SHA1
ba6ab639f7ddf21da263ac9c7a48572c31d87d10
-
SHA256
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623
-
SHA512
541fe3301b13d69bf75c738f95919af2cb52e89911c9b9985403179d0d9efe14f8cdfdad8eacc128f8cb4f014a774726db3ab2de36e7c6b335beba53c532ea0d
Static task
static1
Behavioral task
behavioral1
Sample
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623
-
Size
5.0MB
-
MD5
3340eec1f90de20b798e5f6c2a7b6434
-
SHA1
ba6ab639f7ddf21da263ac9c7a48572c31d87d10
-
SHA256
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623
-
SHA512
541fe3301b13d69bf75c738f95919af2cb52e89911c9b9985403179d0d9efe14f8cdfdad8eacc128f8cb4f014a774726db3ab2de36e7c6b335beba53c532ea0d
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3293) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (774) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-