General
-
Target
42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c
-
Size
5.0MB
-
Sample
220708-a21asacgh2
-
MD5
3ce4cffc202ddafe9e2b2c8f570f4e16
-
SHA1
f331a320d11d62823847ed76228e2e706df6aa2c
-
SHA256
42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c
-
SHA512
24484046e1075e475d58aff29dbe62471bd62925d91209a961fee74007a869c4e5bd4484d38984f65bcff3b7a65adccb711a206a3b25ccd45b894c3065cb4e95
Static task
static1
Behavioral task
behavioral1
Sample
42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c.dll
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c
-
Size
5.0MB
-
MD5
3ce4cffc202ddafe9e2b2c8f570f4e16
-
SHA1
f331a320d11d62823847ed76228e2e706df6aa2c
-
SHA256
42e4a37e63221e523a92700253c928d9f14022bc4078a88182e0f5a3021b3f3c
-
SHA512
24484046e1075e475d58aff29dbe62471bd62925d91209a961fee74007a869c4e5bd4484d38984f65bcff3b7a65adccb711a206a3b25ccd45b894c3065cb4e95
Score10/10-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (2070) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (1118) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Drops file in System32 directory
-