General

  • Target

    2f6697ea3aa10633d689b5fd200d6f07fc03d7dd1f7aad4dafd6f39fb72b1340

  • Size

    707KB

  • MD5

    fc13a28703a7cc86bd1f190bd65452fb

  • SHA1

    4be6c612d0ad93341c36bd7523077705e3467af7

  • SHA256

    2f6697ea3aa10633d689b5fd200d6f07fc03d7dd1f7aad4dafd6f39fb72b1340

  • SHA512

    39ead1976dce9a1e3a7f318fcda7d9c2cd6d9c878f1249eb6b8ab9829c12beb00db9d42d00cbcb4a54b0376f65383132cf32849b18bdbc6e4c7c7692a8cf02d1

  • SSDEEP

    6144:kcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1e88vnh:WuaTmkZJ+naie5OTamgEoKxLW1ih

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2f6697ea3aa10633d689b5fd200d6f07fc03d7dd1f7aad4dafd6f39fb72b1340
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections