General

  • Target

    394eea783a1cf124857fc9fa5c85fd47bbd89b737b29c024932c6fce669038be

  • Size

    707KB

  • MD5

    ebf77b6c779b7e8a3e8c97a44078d30a

  • SHA1

    d5453d2e46735ba26d00623485fe41993bc5cd90

  • SHA256

    394eea783a1cf124857fc9fa5c85fd47bbd89b737b29c024932c6fce669038be

  • SHA512

    5b96403eb9d17557d4f91b168ded29b3a3731d3940f576793b087e11eb77220ef62c38a6e03586d8a5ad03f46c1a1ac5cfcc1b7fbfbb49a4e6368c4980dfd020

  • SSDEEP

    6144:lcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1P84vnh:5uaTmkZJ+naie5OTamgEoKxLWGGh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 394eea783a1cf124857fc9fa5c85fd47bbd89b737b29c024932c6fce669038be
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections