General
-
Target
28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe
-
Size
5.0MB
-
Sample
220615-vhjh5sbcc4
-
MD5
944fee9b45c08401b1eec8dc1cc06d0c
-
SHA1
1cc8b3a27c4f083ebd4787e3fbb8ea3c90d5fb00
-
SHA256
28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe
-
SHA512
c31a988b8f74d1ef554329451b45961c698e767f7f6796e1cd9ccb74c420411f9023e5b842cdd272f5da4ce0a7eacdbb1ac97a51cb681e3925a86e9f4d0111d7
Static task
static1
Behavioral task
behavioral1
Sample
28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe
-
Size
5.0MB
-
MD5
944fee9b45c08401b1eec8dc1cc06d0c
-
SHA1
1cc8b3a27c4f083ebd4787e3fbb8ea3c90d5fb00
-
SHA256
28a084d5a9f7a0d1c1f336f3f75581e6a9cae4dc0a34e44f6fcc79c3dda4dfbe
-
SHA512
c31a988b8f74d1ef554329451b45961c698e767f7f6796e1cd9ccb74c420411f9023e5b842cdd272f5da4ce0a7eacdbb1ac97a51cb681e3925a86e9f4d0111d7
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3283) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1243) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-