General
-
Target
36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859
-
Size
5.0MB
-
Sample
220626-bk8q9sddc2
-
MD5
59e0d7e76406e4c90cba5d6be0fc6902
-
SHA1
f564280d12b7da6b0063243fc649ce95d3e89705
-
SHA256
36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859
-
SHA512
b66eaf5ce643d90f8b2266d0cc26508b55d98458e140b13db24d1ca82a54d67f0c009ac8173753fca30f873e07cfd1e08d7100ed1a2e99d59374271834149413
Static task
static1
Behavioral task
behavioral1
Sample
36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859
-
Size
5.0MB
-
MD5
59e0d7e76406e4c90cba5d6be0fc6902
-
SHA1
f564280d12b7da6b0063243fc649ce95d3e89705
-
SHA256
36dde0acce43dac1e5baa8e4b121a96f9aa0315c4386a203f6ea4e56534c7859
-
SHA512
b66eaf5ce643d90f8b2266d0cc26508b55d98458e140b13db24d1ca82a54d67f0c009ac8173753fca30f873e07cfd1e08d7100ed1a2e99d59374271834149413
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3159) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1317) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-