General
-
Target
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952
-
Size
5.0MB
-
Sample
220707-1twkqsdegp
-
MD5
65047d9e2f90ed75a133096d982c44b5
-
SHA1
51fa0dd51eb722be4c07daf5c4879a92552b88c5
-
SHA256
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952
-
SHA512
b033bc9c3b28bb738bd80f01888998503b277ab8ff6cb058da5c0ca9ed581b4b83a68280b4622699c806af41801e71e3b9301896209eda01d829c2ad53d57d9f
Static task
static1
Behavioral task
behavioral1
Sample
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952
-
Size
5.0MB
-
MD5
65047d9e2f90ed75a133096d982c44b5
-
SHA1
51fa0dd51eb722be4c07daf5c4879a92552b88c5
-
SHA256
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952
-
SHA512
b033bc9c3b28bb738bd80f01888998503b277ab8ff6cb058da5c0ca9ed581b4b83a68280b4622699c806af41801e71e3b9301896209eda01d829c2ad53d57d9f
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (2335) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Drops file in System32 directory
-