Behavioral task
behavioral1
Sample
514ab21709f4e2867b4b79008e37aed7ce501a78785369adb6e31bb90156030c.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
514ab21709f4e2867b4b79008e37aed7ce501a78785369adb6e31bb90156030c.exe
Resource
win10v2004-20231023-en
General
-
Target
12745279545.zip
-
Size
140KB
-
MD5
6b6d3db1e0ea88ffc730f9d071a72e8e
-
SHA1
90cba300a4e778cfa1d8f88ac841a0b1d92eae02
-
SHA256
8da314ff3114e6283d7c3063b95c0f25fee51bed7ed855bcb6031e9c875fbccf
-
SHA512
c65cd8b8dac1c4cc78ed24848f0b5b16cb1ae7d1956e5d574fae605df78bad58d59d98f4c3ca97435faba038c4c6afa15d8fec344168420ab49b34589769a187
-
SSDEEP
3072:lo8cd0qs5ew57JWp9u28BSTGiGsJ9M/uEpNaE8JOlT:lo8es577hBSEA9M/uEpNaolT
Malware Config
Signatures
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule static1/unpack001/514ab21709f4e2867b4b79008e37aed7ce501a78785369adb6e31bb90156030c family_lockbit -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/514ab21709f4e2867b4b79008e37aed7ce501a78785369adb6e31bb90156030c
Files
-
12745279545.zip.zip
Password: infected
-
514ab21709f4e2867b4b79008e37aed7ce501a78785369adb6e31bb90156030c.exe windows:5 windows x86
41fb8cb2943df6de998b35a9d28668e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetPixel
SetDCBrushColor
SelectPalette
GetTextColor
GetDeviceCaps
CreateSolidBrush
user32
DefWindowProcW
CreateMenu
EndDialog
GetDlgItem
GetKeyNameTextW
GetMessageW
GetWindowTextW
IsDlgButtonChecked
LoadImageW
LoadMenuW
DialogBoxParamW
kernel32
SetLastError
LoadLibraryW
GetTickCount
GetLastError
GetCommandLineW
GetCommandLineA
FreeLibrary
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE