General

  • Target

    cb27b2d858fbb0e6c9eb6dfad27a98c12def8bcb192a2c83b7ba925d19233b24.exe

  • Size

    707KB

  • MD5

    ea2bbb2bd2693c7428c26f0b5c632792

  • SHA1

    21977be5d20be5f09fefce1ebe233787aa918733

  • SHA256

    cb27b2d858fbb0e6c9eb6dfad27a98c12def8bcb192a2c83b7ba925d19233b24

  • SHA512

    967e59e6f87fb0179eaa3a27150437d1525d160783ec189e3db69b7a8e8b15b81495e683c3aad9bf728a12ea1bdb41f423002f41f6a324b787ce3cbb1650e012

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza178Uvnh:6uaTmkZJ+naie5OTamgEoKxLWCqh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cb27b2d858fbb0e6c9eb6dfad27a98c12def8bcb192a2c83b7ba925d19233b24.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections