General
-
Target
314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b
-
Size
5.0MB
-
Sample
220620-3hhkvafeg7
-
MD5
b3fcc20dffa1033a5e3ce437f38f6e02
-
SHA1
fb0a472b6a360834e603385283d1780d1eda050a
-
SHA256
314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b
-
SHA512
8979a5a95ec1aa841c9cafbc75990c3a6b426fad4fd1a348d3ce793d733911d76216c7b3ae8645a197439b2af69b596718f5c6c9f7edeb70268157400809d178
Static task
static1
Behavioral task
behavioral1
Sample
314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b
-
Size
5.0MB
-
MD5
b3fcc20dffa1033a5e3ce437f38f6e02
-
SHA1
fb0a472b6a360834e603385283d1780d1eda050a
-
SHA256
314a2f9b8b7b9caf6b83142e4954de026aeacec7a78467e121d289c5389fee0b
-
SHA512
8979a5a95ec1aa841c9cafbc75990c3a6b426fad4fd1a348d3ce793d733911d76216c7b3ae8645a197439b2af69b596718f5c6c9f7edeb70268157400809d178
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3196) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1255) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-