Static task
static1
Behavioral task
behavioral1
Sample
PetyaMFTDestroyer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PetyaMFTDestroyer.exe
Resource
win10v2004-20231222-en
General
-
Target
PetyaMFTDestroyer.exe
-
Size
14KB
-
MD5
a8a9916266bd2cbbca8850c6c67a915c
-
SHA1
5aeb52141addd70e408761d9bdad00751b995eac
-
SHA256
07f5eeb863d8e000fd24cffbf278fae627a0872afb03db01f700355656a883fd
-
SHA512
21e11f9d7b93dceb740fe157d6cc006ad24cb92d51769c471cdd8e63da8e87eacb8350cf8365ba7b64370ec8cc5ca6800d010fa266044a9706e9e347fbb03fef
-
SSDEEP
192:gcUFGq6c+3a6mY49OD2JgH+q3QQ4B/W1bSyg+0SfEl:geaHYzyJE+q3QQ4B/WUyg7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PetyaMFTDestroyer.exe
Files
-
PetyaMFTDestroyer.exe.exe windows:5 windows x86 arch:x86
21e4a55f42c2dcfd0d47cf2cda2692aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
SetFilePointer
SetFilePointerEx
WriteFile
ReadFile
DeviceIoControl
CloseHandle
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ