General

  • Target

    403c32cc84c4b9e743bd3114e897df72452356c45d2f4d213f69dcda9100cecd

  • Size

    707KB

  • MD5

    7505201afcb6e9fa3e7614ddf929f913

  • SHA1

    75f3da6eb16c67dfa10579da4a34d3a28bdf83e4

  • SHA256

    403c32cc84c4b9e743bd3114e897df72452356c45d2f4d213f69dcda9100cecd

  • SHA512

    7887b0758ab96cf4fb62ced830827be8bd45dfbd9139e2a3ea0e198879ddeeeb33a8348e79e92dff17c35afcf63593f60e4999fdd13bb70c31cea08144202864

  • SSDEEP

    6144:lcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1/8Vvnh:5uaTmkZJ+naie5OTamgEoKxLWuRh

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 403c32cc84c4b9e743bd3114e897df72452356c45d2f4d213f69dcda9100cecd
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections