General

  • Target

    bed90a709df4a9aae4a58af69587b707268fdcae2aeccfc99772d29647871621.exe

  • Size

    707KB

  • MD5

    d3579694c980400e10d476eeba13413c

  • SHA1

    e38e5040ddcb70717c86489738dc2f4006350940

  • SHA256

    bed90a709df4a9aae4a58af69587b707268fdcae2aeccfc99772d29647871621

  • SHA512

    1fd0fc13cbda98f1975d581b8fc7619b9c315a3163826c6be1a42c665cd17d3708acd0ac58888197228e963c26e550deccd866c1722832d52bac80e70f8f5f33

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza148Wvnh:6uaTmkZJ+naie5OTamgEoKxLWToh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bed90a709df4a9aae4a58af69587b707268fdcae2aeccfc99772d29647871621.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections