General
-
Target
3950179ee45f03af2d6c1130d0db04ad3441c2befc7fb5a28460d5fc45f1beb8
-
Size
5.0MB
-
Sample
220625-nkeveacef8
-
MD5
fd7c451d538bde5e7f4c44f9adcd9f20
-
SHA1
52bca09f35d9c23bd96d5bbad1fd5e06a245190f
-
SHA256
3950179ee45f03af2d6c1130d0db04ad3441c2befc7fb5a28460d5fc45f1beb8
-
SHA512
fd2926b03f3680d2f9f05ed209c617f7e00069ee451e4bc2c1233dcf6d62f4f6bc414d3cd390fa9d66e814e1ab4364fa20ae0a58a4d496df7c07b250b43bcb0f
Static task
static1
Behavioral task
behavioral1
Sample
3950179ee45f03af2d6c1130d0db04ad3441c2befc7fb5a28460d5fc45f1beb8.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3950179ee45f03af2d6c1130d0db04ad3441c2befc7fb5a28460d5fc45f1beb8.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
3950179ee45f03af2d6c1130d0db04ad3441c2befc7fb5a28460d5fc45f1beb8
-
Size
5.0MB
-
MD5
fd7c451d538bde5e7f4c44f9adcd9f20
-
SHA1
52bca09f35d9c23bd96d5bbad1fd5e06a245190f
-
SHA256
3950179ee45f03af2d6c1130d0db04ad3441c2befc7fb5a28460d5fc45f1beb8
-
SHA512
fd2926b03f3680d2f9f05ed209c617f7e00069ee451e4bc2c1233dcf6d62f4f6bc414d3cd390fa9d66e814e1ab4364fa20ae0a58a4d496df7c07b250b43bcb0f
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (1205) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Drops file in System32 directory
-