General

  • Target

    4f036e9c83f98b6e78a3b2850361101559c7b30ad37cb39cfd72420667c51724.exe

  • Size

    707KB

  • MD5

    534728f1b2a3a68bfc37fb2fc5fad557

  • SHA1

    a683e9e4707fde7b0f918e8631f6ed26e21188ef

  • SHA256

    f65261b95601c325d8b025bd6a957d941aa363f1f9823f81ae5a0930a9a2f6c0

  • SHA512

    ca1e728f6832e12886d3ac0da7790e4693fb19e1291fd2116339993ce69d610d96e9f55423501c954894d70a1c5dddf5873b53a64b5ebc4906d859e6354afa4c

  • SSDEEP

    6144:QcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1w8gvnh:auaTmkZJ+naie5OTamgEoKxLWb+h

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f036e9c83f98b6e78a3b2850361101559c7b30ad37cb39cfd72420667c51724.exe
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections