General
-
Target
35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e
-
Size
5.0MB
-
Sample
220626-24lzqaeagr
-
MD5
856e92809fcf1535c03dac80c00a0122
-
SHA1
a27d855df5fb05888023ad4dc23212878b4bfdf6
-
SHA256
35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e
-
SHA512
88b17f5c28ba5a1784cb609f002fba8f94932c47d4957917db225afef59db1313f14d63e5e16c5e0b807786d89af7f17be00d1dd94f2dea48e5585b663e4ce5f
Static task
static1
Behavioral task
behavioral1
Sample
35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e
-
Size
5.0MB
-
MD5
856e92809fcf1535c03dac80c00a0122
-
SHA1
a27d855df5fb05888023ad4dc23212878b4bfdf6
-
SHA256
35c50669ff577d92f0ffe5f21a394aa1da8e929f12b92594f1f503f9ea263e3e
-
SHA512
88b17f5c28ba5a1784cb609f002fba8f94932c47d4957917db225afef59db1313f14d63e5e16c5e0b807786d89af7f17be00d1dd94f2dea48e5585b663e4ce5f
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3211) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-