General
-
Target
276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c
-
Size
5.0MB
-
Sample
220616-fjmjvsehg5
-
MD5
cb99dbcc738243976831a1a5af249010
-
SHA1
11b3de1c41e9d87610011145d0f81eeb5c44a8ca
-
SHA256
276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c
-
SHA512
3a24cb1d1fcf846efa62c458eabef31368a5fab5470ba3902e7e377524607a250be5aa0ecd1d46f08cb3754344edb87d4185e9c0cf9a2d0282b40b18effe447e
Static task
static1
Behavioral task
behavioral1
Sample
276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c
-
Size
5.0MB
-
MD5
cb99dbcc738243976831a1a5af249010
-
SHA1
11b3de1c41e9d87610011145d0f81eeb5c44a8ca
-
SHA256
276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c
-
SHA512
3a24cb1d1fcf846efa62c458eabef31368a5fab5470ba3902e7e377524607a250be5aa0ecd1d46f08cb3754344edb87d4185e9c0cf9a2d0282b40b18effe447e
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3257) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-