General

  • Target

    c42b3454b4424a570d9fe0c1328ac1449155ad1a8bb91197cda3da5115b52b91.exe

  • Size

    707KB

  • MD5

    f2ee629deea2b776e7d8e71b14bc0b94

  • SHA1

    5a4693742bb5d8b5405c7c593e0e055ca7483c8c

  • SHA256

    c42b3454b4424a570d9fe0c1328ac1449155ad1a8bb91197cda3da5115b52b91

  • SHA512

    3d3ed93c5d59efe5d5082cc3a361a27c116bb5afff8ba1298552c0b2b43ec65d8bff20f00316f24b6653d0b0a28ca4481ef6927fa0c002ed5fab542f2b25cf7b

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1B8dvnh:6uaTmkZJ+naie5OTamgEoKxLWUph

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c42b3454b4424a570d9fe0c1328ac1449155ad1a8bb91197cda3da5115b52b91.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections