Behavioral task
behavioral1
Sample
makop.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
makop.exe
Resource
win10v2004-20220812-en
General
-
Target
6612ae9af3dbefca94d31dc84b3cfea68d4510c505ce0afc1f8373465c102d01
-
Size
21KB
-
MD5
fe1af64e11ab06278713bcdfcdffc048
-
SHA1
e7a95b6098e14fe969cda2097cdc9e4cfcd18e08
-
SHA256
6612ae9af3dbefca94d31dc84b3cfea68d4510c505ce0afc1f8373465c102d01
-
SHA512
32d92a0ec34309fcd8fd04795da04158c027de9ac9ed40b6aaa1ec8e121aae1f6075a89283309427255b9e945a51fdda14d197948dc023503274734777050b64
-
SSDEEP
384:zZXHO7IUI7cEBYSTk6ZzZd6bA/9pqKQVkzhuvqgy7EmIaVrYb9R9s9wrXd+fOmHz:zZDUI7copAMlEsXqJVkkSumhcbz90wrK
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule static1/unpack001/makop.bin family_makop -
Makop family
Files
-
6612ae9af3dbefca94d31dc84b3cfea68d4510c505ce0afc1f8373465c102d01.zip
Password: infected
-
makop.bin.exe windows x86
b2a2e59916055b004c7a8f339a45d95f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
kernel32
FindFirstFileW
DeviceIoControl
GetDriveTypeW
WaitForMultipleObjects
SetErrorMode
FindNextFileW
Sleep
WriteFile
ReadFile
FlushFileBuffers
GetFileSizeEx
MoveFileW
SetFileAttributesW
SetEndOfFile
SetFilePointerEx
GetProcessHeap
GetVersion
FindClose
GetCurrentProcess
HeapFree
GetProcAddress
LoadLibraryA
OpenProcess
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetLastError
GetCommandLineW
Process32NextW
CreateMutexA
CreateToolhelp32Snapshot
GetLocaleInfoW
GetEnvironmentVariableW
GetModuleFileNameW
PeekNamedPipe
CreateProcessW
Process32FirstW
GetSystemWindowsDirectoryW
SetHandleInformation
CreateDirectoryW
CreateFileW
GetFileAttributesW
GetLogicalDrives
CreateThread
WaitForSingleObject
GetVolumeInformationW
TerminateProcess
DeleteCriticalSection
GetExitCodeProcess
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
CloseHandle
HeapAlloc
CreatePipe
user32
wsprintfW
wsprintfA
GetShellWindow
GetWindowThreadProcessId
advapi32
CryptSetKeyParam
CryptAcquireContextW
CryptDecrypt
CryptDestroyKey
CryptGenRandom
CryptReleaseContext
GetTokenInformation
SetTokenInformation
OpenProcessToken
RegCloseKey
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
CryptEncrypt
CryptImportKey
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
ord680
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE