General

  • Target

    2024-01-18_c7a04433f888c12bb4613927d0d68352_petya

  • Size

    2.8MB

  • MD5

    c7a04433f888c12bb4613927d0d68352

  • SHA1

    4419e92ab4dafadb745167473a0a2da7e055866b

  • SHA256

    c0e10f3c11c759db17b2fc9e1a402724956f5a8efc13e0b3cd2639a363d597e5

  • SHA512

    a83a275db3c32225ae208ce7fff40f1cfb2a4cd68189caed212c78108451e4f8b45171a3e47b9887ae11b523bc8aa1bfeb81c0393684fb9b9c8f2280ca727567

  • SSDEEP

    49152:ri94FiQoRiPoPoxsWsaLevUBwsKV/cUZFdXrX75hJSCACytBxZV6X4snchEl/jnS:r1k8+dm3Oxji2l8U7WuTMCPeM2ieLTyC

Score
10/10

Malware Config

Signatures

  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_c7a04433f888c12bb4613927d0d68352_petya
    .exe windows:5 windows x64 arch:x64

    32ebf6d05d9909a5528c036496ee3157


    Headers

    Imports

    Sections