General
-
Target
4c8e978b010a37c740e8b557a6f490c3.bin
-
Size
330KB
-
Sample
240116-bzr23aaegq
-
MD5
4c8e978b010a37c740e8b557a6f490c3
-
SHA1
6661df1fb45fb7a31a928bad905fb5f6dddba978
-
SHA256
1e4b3abd4c517a286c610010e9aa1b9ce442f31be5b16678d084ec3c91a73802
-
SHA512
3b037d07c9a82c4851cd6746134d46e2a9ada5a93ca59658a97a08e0e0d9abd1b38621c1c2880a5015cfc0683749a5ec5540ce126fbe528dfbb386dcbc3f718b
-
SSDEEP
6144:TH3TcSCVrQ+AoixpWJLnbKhfGTnzalM6bSiYN7ktsbPP2dnn3ZtBmbaRkOktI/gq:XVC5QU1nuOzW6uNYN7ktWA3PBmbaRTXN
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware.GoldenEye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Ransomware.GoldenEye.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Ransomware.GoldenEye.js
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Ransomware.GoldenEye.js
Resource
win10v2004-20231222-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
Ransomware.GoldenEye.exe
-
Size
254KB
-
MD5
e3b7d39be5e821b59636d0fe7c2944cc
-
SHA1
00479a97e415e9b6a5dfb5d04f5d9244bc8fbe88
-
SHA256
389a7d395492c2da6f8abf5a8a7c49c3482f7844f77fe681808c71e961bcae97
-
SHA512
8f977c60658063051968049245512b6aea68dd89005d0eefde26e4b2757210e9e95aabcef9aee173f57614b52cfbac924d36516b7bc7d3a5cc67daae4dee3ad5
-
SSDEEP
3072:iTAjnioLO7WpLyLNZMcPSK7BaZ0NwAWMGc0HfmY4KsyyOiy12KJ3I4YgTl:i6nrD0ZMcPBAL7c0fTHs+2sYXg
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
-
-
Target
Ransomware.GoldenEye.js
-
Size
365KB
-
MD5
c4e9fc349d5c8b24c0ddb1533de2c16b
-
SHA1
147e938bd06709b3c20eea4ac461093d573be037
-
SHA256
28fd3a1d9087d7b103b7f6cfca002798b6365fe6ebcc66fa02dbb4a9e6378e71
-
SHA512
fd0cf6f434e665aabc91f6095394a08483990c12a0b6ad3a1bd820b740af0ddbc02bc0a2592be429c7488b3cd2889afad8f758b4258009dfe51e9faac76842be
-
SSDEEP
6144:Jnm5mwYxm+DzkzFIDIWCy49ezGywT7PDSzT3enlJ1BJ0exGqkIb1Taha6e2T6Huv:FnaIEWeqWdnlhJ+eHHu+1Qk3C+MAQ
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-