Behavioral task
behavioral1
Sample
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe
Resource
win10v2004-20240412-en
General
-
Target
dea93a0cf6e55dcfd1a4b9c10324b0b4edea974cc60878296601e6dc9f16c166
-
Size
31KB
-
MD5
f86bc4d1c11a104ec3c305ce5ea8278f
-
SHA1
d9b1a57189493920d4735b4d03dbac475b8c1915
-
SHA256
dea93a0cf6e55dcfd1a4b9c10324b0b4edea974cc60878296601e6dc9f16c166
-
SHA512
97b5234052e06b134eaa86ea5e534b1cd16edb69b03bd0909236c87edc044050274102c4165d9c7c6fc591c252bccbb32c251a670b68cb4c03ee0e3d71768c11
-
SSDEEP
768:hLw6lD/DJe77K0Kq75NXGLKQ7NOB82NxZORYSbAbr9O4:hLwos/SqdtGLKQ70CaxZFSbV4
Malware Config
Signatures
-
Nefilim family
-
Nefilim ransomware executable 2 IoCs
File contains patterns typical of Nefilim samples.
Processes:
resource yara_rule static1/unpack001/5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6 nefilim_ransomware static1/unpack002/out.upx nefilim_ransomware -
Processes:
resource yara_rule static1/unpack001/5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6 upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6 unpack002/out.upx
Files
-
dea93a0cf6e55dcfd1a4b9c10324b0b4edea974cc60878296601e6dc9f16c166.zip
Password: infected
-
5ab834f599c6ad35fcd0a168d93c52c399c6de7d1c20f33e25cb1fdb25aec9c6.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ