General

  • Target

    b20f0fcd6f13c2ae9cb7a7c19023873b9c5236631427f3585c4d6c2936be6e87.exe

  • Size

    707KB

  • MD5

    49f0c7fbba9dd365d6d49bbfa689c2ca

  • SHA1

    b3120283ec552995b72f10691c56ed93a927d160

  • SHA256

    b20f0fcd6f13c2ae9cb7a7c19023873b9c5236631427f3585c4d6c2936be6e87

  • SHA512

    fc28e92b1fcbbb781c590731b8c8c4f715bc542a4df23549d05151f68da019520c1f0bb4b667104f1539bf75954c632599bdb8c8fb015e39582e517b4a933255

  • SSDEEP

    6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1E8Nvnh:6uaTmkZJ+naie5OTamgEoKxLW/5h

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b20f0fcd6f13c2ae9cb7a7c19023873b9c5236631427f3585c4d6c2936be6e87.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections