General
-
Target
39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec
-
Size
5.0MB
-
Sample
220625-kdx6mafcg5
-
MD5
0a2c063f550e10312445b60810881a76
-
SHA1
3e2d2bf020e22fd4b58a118d7111606703e1cb71
-
SHA256
39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec
-
SHA512
2085766d747968cf42f55829481696ccb68f46bff602ac32019d1fd48122a94d7f522e1470371748f4f0263bcfb5375c050d17e9a333892030022fab4ce3305f
Static task
static1
Behavioral task
behavioral1
Sample
39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec
-
Size
5.0MB
-
MD5
0a2c063f550e10312445b60810881a76
-
SHA1
3e2d2bf020e22fd4b58a118d7111606703e1cb71
-
SHA256
39c7bdb2d0fc8f2b11de1e781d88296ac233b0b6a8a9cea08f230661af75fdec
-
SHA512
2085766d747968cf42f55829481696ccb68f46bff602ac32019d1fd48122a94d7f522e1470371748f4f0263bcfb5375c050d17e9a333892030022fab4ce3305f
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (2832) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1279) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-