Static task
static1
Behavioral task
behavioral1
Sample
Ransomware.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Ransomware.exe
Resource
win10v2004-20230220-en
General
-
Target
Ransomware.FarAttack.zip
-
Size
34KB
-
MD5
cf7a2b65b3f3c5e30f3b3d16d95e2e8a
-
SHA1
3e9ef8f5c5b923c02544608dc9a5beb7e3ebe151
-
SHA256
0eaf733fb2225fc980d69348c501d3a2359c12a1dd20658b62c7f8d062dc2c4c
-
SHA512
df77d8b3169fb3b653a9e1559826bc0df084d95a2bd5fc21a843ddaa7509cdf9ffcfb5a25762d71f62fc72f7bf9d722ba668d7e3497b7f047ff136ffe0f9321e
-
SSDEEP
768:UABFtGMrGd8nRV0o2NRKQQjzDGREGbjqIIeCX9jfWVXoO5W:UABFtB1RSRaCRE6jPt+9jfWVX75W
Malware Config
Signatures
Files
-
Ransomware.FarAttack.zip.zip
Password: infected
-
Ransomware.FarAttack.exe windows x86
df7bbfc4ee909c0b4332a2345abe896a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
GetProcessHeap
OpenProcess
GetFileSizeEx
CloseHandle
lstrcmpiW
CreateFileW
VirtualAlloc
VirtualFree
GetProcAddress
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
LoadLibraryW
GetLastError
SetEndOfFile
SetFilePointerEx
FlushViewOfFile
lstrlenW
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
SetFileAttributesW
GetFileAttributesW
MoveFileExW
LocalFree
GetCurrentProcess
GetCurrentProcessId
ExitProcess
CreateThread
GetCurrentThread
SetThreadPriority
CreateIoCompletionPort
PostQueuedCompletionStatus
WaitForMultipleObjects
Sleep
GetLogicalDrives
WriteFile
ReadFile
SetFilePointer
GetSystemInfo
lstrcatW
GetModuleFileNameW
GetCommandLineW
GetEnvironmentVariableW
GetDriveTypeW
QueryDosDeviceW
CopyFileW
MoveFileW
SetPriorityClass
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
SetVolumeMountPointW
GetVolumePathNamesForVolumeNameW
GetQueuedCompletionStatus
FindClose
FindFirstFileW
FindNextFileW
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
Sections
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE