General

  • Target

    4e9a10ea5f9df13feac3e0f11b00d522611fe2a7e7f369d548fad7062fc74ca0.exe

  • Size

    707KB

  • MD5

    933d69fa380d83919350f9efc60c3733

  • SHA1

    986700956183bb4d98f453db6572131e134c7f5f

  • SHA256

    4e9a10ea5f9df13feac3e0f11b00d522611fe2a7e7f369d548fad7062fc74ca0

  • SHA512

    46b8322b0f60425ef79bdd915836795374d28b256913a86663aa53a2095c5dac0ce010aa92e58c5fba292608d9286370d94077eb97c062a7b9606d6da8e9e48c

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1V8Lvnh:6uaTmkZJ+naie5OTamgEoKxLWAbh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4e9a10ea5f9df13feac3e0f11b00d522611fe2a7e7f369d548fad7062fc74ca0.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections