C:\Users\Madris\Desktop\Malware\plutoware-main - Copie\Plutus\obj\Release\Activator.pdb
Behavioral task
behavioral1
Sample
221012-nbr4daddam.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
221012-nbr4daddam.exe
Resource
win10v2004-20240226-en
General
-
Target
221012-nbr4daddam
-
Size
326KB
-
MD5
f8533019841821eabdaec327f39ac2af
-
SHA1
def6b8c24e7bc476d1260499f51885bd7fb3fd69
-
SHA256
73d8e7baa073997d060ecf826b533263cf857a89b36a5fea809b7dbfc70b2d25
-
SHA512
7b430cd802802d22ee5423d3dae92ee87fef18698fae43125a0d8b5c6c5740f93af076981345ad21d0e0bfacba08dd2cba02002dea3c8f4d2a5d34e637cdc3c9
-
SSDEEP
3072:V+biqYv27xcRI7KmR3XatDLJbfdI7o7X1DfrNo9e/JsY9fK9Hc:V+bDO2NcWR3XwlbbX9rx9y
Malware Config
Signatures
-
Detect MafiaWare666 ransomware 1 IoCs
Processes:
resource yara_rule sample family_mafiaware666 -
Mafiaware666 family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 221012-nbr4daddam
Files
-
221012-nbr4daddam.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ