General

  • Target

    3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe

  • Size

    707KB

  • MD5

    5a0a0ea1a14e9fced35ed042253b317f

  • SHA1

    b7d6e78e607a9e9ed9d180a4a257c4b29f9bfe9b

  • SHA256

    3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7

  • SHA512

    0b1f7adbdfa087a597ffc76d76ace2f15ca7691c7c274a731d3c9b258fd9356a573a488b7d7e08bbac3a0c03188b93280ebf9c64b6a4b561be3fe8d5c94cd83a

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1F89vnh:6uaTmkZJ+naie5OTamgEoKxLWoJh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3ea098b8d75612f82aed4707ebaed7c7a91bef97a343f6f9f892f4d96d68c5c7.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections