General

  • Target

    400df1694b7f92be9b8fc4d8ecba7c199aa005a0ce0256e418850b7934e3d5c9.exe

  • Size

    707KB

  • MD5

    49365bcae2ebae36d50cbfb3a9b2dc1c

  • SHA1

    d46726aa803368acf16321dddeec91daee0e12ac

  • SHA256

    400df1694b7f92be9b8fc4d8ecba7c199aa005a0ce0256e418850b7934e3d5c9

  • SHA512

    e3820004c30e96ddc239d2c9b5926e774cb9c5b613ae647c1303808ffa3cb28affecf0e4fbb7db1afe46c9138d684c365dca7369211b73a2839ebe241f34e89b

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1+86vnh:6uaTmkZJ+naie5OTamgEoKxLWFUh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 400df1694b7f92be9b8fc4d8ecba7c199aa005a0ce0256e418850b7934e3d5c9.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections