Static task
static1
Behavioral task
behavioral1
Sample
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe
Resource
win10v2004-20240508-en
General
-
Target
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23
-
Size
92KB
-
MD5
609d2e4eb7d20b36325a7802f271dc01
-
SHA1
469a568005cfafb8938cc7b16f365ab8f225978b
-
SHA256
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23
-
SHA512
26bf39e82253ee0511b3498efb320785ea39b6904d8fea73aa8fe81bd218774192f484c4b8e05e69b4c55176d566afca70d187c270347a8a13a0b0c9a019e72f
-
SSDEEP
1536:GBwl+KXpsqN5vlwWYyhZ9S4AB8Dsx7Zoygwff/WDb4hkUwqS06ky597:ww+asqN5aW/hS1Z2bDbCkUK0
Malware Config
Signatures
-
Detects win.dharma. 1 IoCs
Processes:
resource yara_rule sample win_dharma_auto -
Identifies DHARMA ransomware 4 IoCs
Processes:
resource yara_rule sample Windows_Ransomware_Dharma_aa5eefed sample Windows_Ransomware_Dharma_b31cac3f sample Windows_Ransomware_Dharma_e9319e4a sample Windows_Ransomware_Dharma_942142e3 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23
Files
-
256c7da35b7efeff1db388ad09d341bc32839dae0edcb5524bc39fa358fe4d23.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE