Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_e1992567a81c254b849db30c7af437b8_crysis_dharma.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-10_e1992567a81c254b849db30c7af437b8_crysis_dharma.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-10_e1992567a81c254b849db30c7af437b8_crysis_dharma
-
Size
92KB
-
MD5
e1992567a81c254b849db30c7af437b8
-
SHA1
913223f7da311250baccba0adca61670216d41bd
-
SHA256
884eb9b2819fd2d1a2835e1573e8f2bf8e0406df5fac189b2694ade397a480ff
-
SHA512
58dd2390d64a7a9172c8720ee1ae52d2c8551c253e8d68a19935c3f4bc0d8906c76516610cf3fc0b183b4de241807820d6269f40f3cbc47c3a0a2c8021f425ce
-
SSDEEP
1536:GBwl+KXpsqN5vlwWYyhZ9S4AurqsLrK0OAFHGpQMAOHC5viuVErCTb:ww+asqN5aW/hSuTNHGpQjOilNuC/
Malware Config
Signatures
-
Detects win.dharma. 1 IoCs
Processes:
resource yara_rule sample win_dharma_auto -
Identifies DHARMA ransomware 4 IoCs
Processes:
resource yara_rule sample Windows_Ransomware_Dharma_aa5eefed sample Windows_Ransomware_Dharma_b31cac3f sample Windows_Ransomware_Dharma_e9319e4a sample Windows_Ransomware_Dharma_942142e3 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-06-10_e1992567a81c254b849db30c7af437b8_crysis_dharma
Files
-
2024-06-10_e1992567a81c254b849db30c7af437b8_crysis_dharma.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE