General
-
Target
3ca20938c652880a62726152cf45b0fb46a7cf85da69c979d17176cdd1669c3d
-
Size
5.0MB
-
Sample
220703-gh9hnshccn
-
MD5
1bb736b97b5bcb4c5b3adf5c3c903fa3
-
SHA1
10f9c2033d3ff3618ca7253f7b68a09bbd681c4c
-
SHA256
3ca20938c652880a62726152cf45b0fb46a7cf85da69c979d17176cdd1669c3d
-
SHA512
9036eb430ec907311b90f623aab08a17b27e2238c3a8745e5436837d57f34156ff81efa87abe8770e9a87444c62934f8979d66ef42c2b67c9d02c22f50c02285
Static task
static1
Behavioral task
behavioral1
Sample
3ca20938c652880a62726152cf45b0fb46a7cf85da69c979d17176cdd1669c3d.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3ca20938c652880a62726152cf45b0fb46a7cf85da69c979d17176cdd1669c3d.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
3ca20938c652880a62726152cf45b0fb46a7cf85da69c979d17176cdd1669c3d
-
Size
5.0MB
-
MD5
1bb736b97b5bcb4c5b3adf5c3c903fa3
-
SHA1
10f9c2033d3ff3618ca7253f7b68a09bbd681c4c
-
SHA256
3ca20938c652880a62726152cf45b0fb46a7cf85da69c979d17176cdd1669c3d
-
SHA512
9036eb430ec907311b90f623aab08a17b27e2238c3a8745e5436837d57f34156ff81efa87abe8770e9a87444c62934f8979d66ef42c2b67c9d02c22f50c02285
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3220) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1276) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-