Behavioral task
behavioral1
Sample
8f50fbedc43a58fef6fe276a60eaf8a9539a8573.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8f50fbedc43a58fef6fe276a60eaf8a9539a8573.exe
Resource
win10v2004-20220414-en
General
-
Target
8f50fbedc43a58fef6fe276a60eaf8a9539a8573.rl.zip
-
Size
2.4MB
-
MD5
a88255a14ce0a6863d1b256e08aa97e9
-
SHA1
3ab9b8860b431ca290fde495ed9508fb84ba4145
-
SHA256
5513b157beb22e67e20412c040964d626ca1f1938cb92a8440b3e8e016409941
-
SHA512
fa0f4a15bf7a64c65fb9fa8a667335985a696f375700479e744982b0167d6a09b20d8b8767a680365c713e2bd859d616cbfb8c736be9b9e140ec4e31e2a813ca
-
SSDEEP
49152:SuWl1a8kC04kysO98mR/H7gyIarghP5zbFV29KP+SCt8kXCCkdHuKOF:SrPvGKD3xiPlbv2w1aCnJYF
Malware Config
Signatures
-
Detecting the common Go functions and variables names used by Snatch ransomware 1 IoCs
Processes:
resource yara_rule static1/unpack001/8f50fbedc43a58fef6fe276a60eaf8a9539a8573.rl family_snatch -
Snatch family
-
Processes:
resource yara_rule static1/unpack001/8f50fbedc43a58fef6fe276a60eaf8a9539a8573.rl upx
Files
-
8f50fbedc43a58fef6fe276a60eaf8a9539a8573.rl.zip.zip
Password: infected
-
8f50fbedc43a58fef6fe276a60eaf8a9539a8573.rl.exe windows x64
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE