General

  • Target

    36e5b991fdd83049d53e13c59ec7e591ca9eaf95c6151ae967ce3e2ae73b5ed5

  • Size

    707KB

  • MD5

    f461553702b0791abfd3453b523e1e14

  • SHA1

    6b292f566109331595ce357f82dbb7063e4f96fd

  • SHA256

    36e5b991fdd83049d53e13c59ec7e591ca9eaf95c6151ae967ce3e2ae73b5ed5

  • SHA512

    353451167bdbf185ffed638a7a7a8a23e04cf76eba0265bcbbf25b57924425663a20193c2339547b2dcbf289dcc085e3d6250e23389034003b3eb5d694ae630e

  • SSDEEP

    6144:kcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1U8Evnh:WuaTmkZJ+naie5OTamgEoKxLWX6h

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 36e5b991fdd83049d53e13c59ec7e591ca9eaf95c6151ae967ce3e2ae73b5ed5
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections