General

  • Target

    c36cd782a070ab7fbd3dc25abc2dc5a714e154a647a78a07dbf4df2cde0fe92f.exe

  • Size

    707KB

  • MD5

    1ef8d0414a7d2a93f7fcb1db8f97c5a5

  • SHA1

    20fc839d991c1f6893587def5aceb7b47c059031

  • SHA256

    c36cd782a070ab7fbd3dc25abc2dc5a714e154a647a78a07dbf4df2cde0fe92f

  • SHA512

    e3f32b612f962a33bca793969ac32e3e7e59d3b0e787f26eba296323c8a07bdceaf5d235037dfc02e3df623b51b257b0b63db352dc8e6e883c11566fa9688364

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1N8mvnh:6uaTmkZJ+naie5OTamgEoKxLWwYh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • c36cd782a070ab7fbd3dc25abc2dc5a714e154a647a78a07dbf4df2cde0fe92f.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections