General

  • Target

    Ransomware.Radamant.zip

  • Size

    59KB

  • MD5

    fce365d60e13df34a6843894ac9be499

  • SHA1

    5211ac4e7d8459f0db9aa19a03c55cb2063fee5f

  • SHA256

    3e1813da2d561157df7667cde0117fdddd883c5b1272f76d1ae85ad889c38220

  • SHA512

    9747c95c1a1314fd0fb462951feafa51a75c0794e56a6bbbd16d192e366907aa764bc9adbc7d8319e5d43a37b10889808ae5d619ae1202200d7dba34afa2bc1b

  • SSDEEP

    1536:cKmaCJ5RF2bf2mwPUv0M47ChtgxyZShQ9FttDUFQ1VkJA/:XmHJAY23iSOxygkFttQFSkJA/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • Ransomware.Radamant.zip
    .zip

    Password: infected

  • DUMP_00A10000-00A1D000.exe.ViR
    .exe windows:4 windows x86 arch:x86

    Password: infected


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • Supplementary Agreement 26_01_2016.zip.ViR
    .zip

    Password: infected

  • Supplementary Agreement 26_01_2016.scr
    .exe windows:5 windows x86 arch:x86

    Password: infected

    67ef42078ff0fa6e633d4e8d0e87faba


    Headers

    Imports

    Sections