General
-
Target
34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12
-
Size
5.0MB
-
Sample
220619-yn17xsafgm
-
MD5
ab02e31aa2a8ea6eecc684bfa2e3c185
-
SHA1
6665249de09b0900743d45e141c0ec186d2e00b2
-
SHA256
34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12
-
SHA512
b3b8f69b5ee03890c41a4619d50dc3bcb569b5921395b226f52f790a53b553006e9ac9be417667a31664443bf7bf6cb0928c63873ffab4267268938afa6923b0
Static task
static1
Behavioral task
behavioral1
Sample
34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12
-
Size
5.0MB
-
MD5
ab02e31aa2a8ea6eecc684bfa2e3c185
-
SHA1
6665249de09b0900743d45e141c0ec186d2e00b2
-
SHA256
34d01301694469e1cf68caa738db6cd0373bcc785649fb2f108fc39428554a12
-
SHA512
b3b8f69b5ee03890c41a4619d50dc3bcb569b5921395b226f52f790a53b553006e9ac9be417667a31664443bf7bf6cb0928c63873ffab4267268938afa6923b0
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (2246) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1066) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Drops file in System32 directory
-