General

  • Target

    2024-04-25_d5943874c1ef362fd0e2c927d145cd89_petya

  • Size

    2.6MB

  • MD5

    d5943874c1ef362fd0e2c927d145cd89

  • SHA1

    76fa3288dc46c838e191110cce014554bb1ae224

  • SHA256

    13005792d9eeb033a5c68ccbd6b3bb9ebe50c9f60e31699eeb5475edde0ccf4d

  • SHA512

    8a668200ed18d9e7d14c6b3dcbd542fdfbc64de03590f0f1d9df322697141be3779f24dc319c5f07444aab1bec9480ca32bf2802c0338380435d5183bc77dc68

  • SSDEEP

    49152:tAmOd4q4wrmisRc+KjtZ5BvGePoIycUkp3Oxji2l8U7WubnMCPeM2ieLTyBql3H:GOdm3Oxji2l8U7WuTMCPeM2ieLTyBqlX

Score
10/10

Malware Config

Signatures

  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs

Files

  • 2024-04-25_d5943874c1ef362fd0e2c927d145cd89_petya
    .exe windows:5 windows x86 arch:x86

    d9a5e5bfbab55cfd8c0fa5e8fd8d5594


    Code Sign

    Headers

    Imports

    Sections