Behavioral task
behavioral1
Sample
1866b28b51045944df18e63c9a5989afe985e30ff1944db6544ca76b32235567.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1866b28b51045944df18e63c9a5989afe985e30ff1944db6544ca76b32235567.exe
Resource
win10v2004-20240226-en
General
-
Target
7be5aadca6217a7d7ba0460b5b1e5bb31dd5e9b2fa17994113373611ed52e850
-
Size
153KB
-
MD5
160a8d01f926cd23a870a10dad6827d8
-
SHA1
957c342241cbd94e17bbdb90957fda7a59596f91
-
SHA256
7be5aadca6217a7d7ba0460b5b1e5bb31dd5e9b2fa17994113373611ed52e850
-
SHA512
19c5b183188255fdcda7d10b362ca66e43ef24efa7197abe84ca30762491dffa444bf88e3bd41e333d055bdb9322670e22709c16c2332c9a7a8696efbeb91f80
-
SSDEEP
3072:wXxopivtRskZgG8oVLONrWaS8ftx5EavMnj701of/n:MopiVRRZg/l3S8ftxSacn01onn
Malware Config
Signatures
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule static1/unpack001/1866b28b51045944df18e63c9a5989afe985e30ff1944db6544ca76b32235567.exe family_lockbit -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1866b28b51045944df18e63c9a5989afe985e30ff1944db6544ca76b32235567.exe
Files
-
7be5aadca6217a7d7ba0460b5b1e5bb31dd5e9b2fa17994113373611ed52e850.zip
Password: infected
-
1866b28b51045944df18e63c9a5989afe985e30ff1944db6544ca76b32235567.exe.exe windows:5 windows x86 arch:x86
89b43582b27abefb2b74684ab12a2f8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateDIBitmap
TextOutW
SetTextColor
SetPixel
GetTextMetricsW
GetTextColor
GetTextCharset
BitBlt
user32
CreateDialogParamW
CreateMenu
DefWindowProcW
EndDialog
GetDlgItem
GetKeyNameTextW
LoadImageW
kernel32
GetModuleHandleW
SetLastError
LoadLibraryW
LoadLibraryExA
FormatMessageW
GetLastError
GetDateFormatW
GetAtomNameW
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE