General
-
Target
2d8ebde851e42622e0b6e60ec831e03a.exe
-
Size
1006KB
-
Sample
240222-xr48baee32
-
MD5
2d8ebde851e42622e0b6e60ec831e03a
-
SHA1
e77962926002b4603017901c097a54e8f83b6da9
-
SHA256
2efb62748a9a6b808dcc9c6303ff8c4567a2ee20a56022f8ecbe3b6739fb0a40
-
SHA512
39392647c1f82bf417986961a4b62a7843977f9aa641fcb10a4e4a943ab5b617d6c20bad4c14664a951528979fe8ea6f7b58b932d9d45c5b883dea6a65b05a86
-
SSDEEP
12288:hSCbvRebC9TrasaYadqjRaQaofKkzaxa3+:oev/f3h7+QWr
Behavioral task
behavioral1
Sample
2d8ebde851e42622e0b6e60ec831e03a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2d8ebde851e42622e0b6e60ec831e03a.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\3CD829-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Users\Admin\Desktop\984466-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
2d8ebde851e42622e0b6e60ec831e03a.exe
-
Size
1006KB
-
MD5
2d8ebde851e42622e0b6e60ec831e03a
-
SHA1
e77962926002b4603017901c097a54e8f83b6da9
-
SHA256
2efb62748a9a6b808dcc9c6303ff8c4567a2ee20a56022f8ecbe3b6739fb0a40
-
SHA512
39392647c1f82bf417986961a4b62a7843977f9aa641fcb10a4e4a943ab5b617d6c20bad4c14664a951528979fe8ea6f7b58b932d9d45c5b883dea6a65b05a86
-
SSDEEP
12288:hSCbvRebC9TrasaYadqjRaQaofKkzaxa3+:oev/f3h7+QWr
Score10/10-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Renames multiple (7450) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-