General

  • Target

    4869f3ead232e13c4eab6a7e70ee1d610c1328242e3895f540b52f7b1457d289

  • Size

    707KB

  • MD5

    d8e5bc03dd8a9c66949b4002405e56ec

  • SHA1

    cea32c11857fcdf5d3ef8a1a35beeeeeadb89e3a

  • SHA256

    4869f3ead232e13c4eab6a7e70ee1d610c1328242e3895f540b52f7b1457d289

  • SHA512

    a7f1766330323f56810dbaeedbba68ec7150d0e539a96fc764cdcb9c17d0c6af87e8d1c12a894279077cf0f7c93fb6f0a21f859d49313001961897a101307ebf

  • SSDEEP

    6144:kcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1785vnh:WuaTmkZJ+naie5OTamgEoKxLWq9h

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4869f3ead232e13c4eab6a7e70ee1d610c1328242e3895f540b52f7b1457d289
    .exe windows:5 windows x86 arch:x86

    2f7da257a3159bdb9faeb823ef872a56


    Headers

    Imports

    Sections