General

  • Target

    4f601f8e4c3f3bfbf2c48f94f72f21e0c3c842ef26760def0866a3f1d4ce3b2f.exe

  • Size

    707KB

  • MD5

    534c9f767b09793190b50913aeb9dc4f

  • SHA1

    d6ce0fad4f205154d62d355fd4b72432b6a708a6

  • SHA256

    4f601f8e4c3f3bfbf2c48f94f72f21e0c3c842ef26760def0866a3f1d4ce3b2f

  • SHA512

    bb1af61589f2a0f79c29b1adf539ebce81ba002a6f1462fa0c8ef57a79c2e618706c9d09f735d0024fa29d3f895941cc181369f3fa22c4624d0184cb604dc59d

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1F8nvnh:6uaTmkZJ+naie5OTamgEoKxLWIvh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f601f8e4c3f3bfbf2c48f94f72f21e0c3c842ef26760def0866a3f1d4ce3b2f.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections