General
-
Target
30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726
-
Size
5.0MB
-
Sample
220621-b2w4ssaec2
-
MD5
4bbb8df5d25162f260e362c7dbce13ba
-
SHA1
67e8415d133178158461b946d5ca0533e1015409
-
SHA256
30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726
-
SHA512
9ccf0cfa8078450a16fffd5c4a0fe79cb2cbe621b9ebf5224d3318d45602b3569ee8f470c882885cc049eab46ef61b5ecb09c7e6d7646d962eee917b7b043267
Static task
static1
Behavioral task
behavioral1
Sample
30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726
-
Size
5.0MB
-
MD5
4bbb8df5d25162f260e362c7dbce13ba
-
SHA1
67e8415d133178158461b946d5ca0533e1015409
-
SHA256
30dfe8984c16055acdb3720a8e2c51ad67dfc4bcf274f9d6df8d7ad206b0d726
-
SHA512
9ccf0cfa8078450a16fffd5c4a0fe79cb2cbe621b9ebf5224d3318d45602b3569ee8f470c882885cc049eab46ef61b5ecb09c7e6d7646d962eee917b7b043267
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3092) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1266) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-