General

  • Target

    42b9fab00649c0757114d4ebf023900edafb38fb7eac8f20a1074cf596f3340c.exe

  • Size

    707KB

  • MD5

    adc8a4a4734737b9f27c5ee5745888e0

  • SHA1

    637b70c6dafedc5e35c85d7757aded827d8a7b4c

  • SHA256

    42b9fab00649c0757114d4ebf023900edafb38fb7eac8f20a1074cf596f3340c

  • SHA512

    71e9b568579f9edb54d15ed1b5a34762f651ef7f6420b3fd955017216a6efafff5843b64d7a39aec72b2908729120de20429cec6ddf95edc65df02453427d986

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1J8ovnh:6uaTmkZJ+naie5OTamgEoKxLW0Wh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 42b9fab00649c0757114d4ebf023900edafb38fb7eac8f20a1074cf596f3340c.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections