Resubmissions
21-06-2024 18:05
240621-wpjyxssgrq 319-05-2024 19:58
240519-ypxk5afa97 1019-05-2024 19:48
240519-yjgygseh3x 119-05-2024 19:17
240519-xzbkzade91 10Analysis
-
max time kernel
1380s -
max time network
1171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
httpsgofile.iodntQlho.txt
Resource
win10v2004-20240426-en
1 signatures
1800 seconds
General
-
Target
httpsgofile.iodntQlho.txt
-
Size
26B
-
MD5
beb4937bff161601f6e59c168205d2da
-
SHA1
c26f4c5c7334eb6184d08adbacbb8fb6a8653ab4
-
SHA256
215d09d1793ed0f9da71484b97fb12b7d40b0fc0cb5f509e037ed721760c9d96
-
SHA512
16ab09407a5af59545ef8defb651b13572987bbcfb4fd87fef2de24d977ab3c6e8b7d83e83cb8247fae050724ecea880637b57b2dcc6164279207478b35f4eb5
Score
1/10
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1940 NOTEPAD.EXE