Resubmissions
15-06-2024 17:25
240615-vzf5casdqm 315-06-2024 17:24
240615-vy3xqasdpl 315-06-2024 17:22
240615-vx1qzaycqd 4Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
Bruh.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Bruh.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Bruh/here.txt
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Bruh/here.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Bruh/honeypot.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Bruh/honeypot.exe
Resource
win10v2004-20240508-en
General
-
Target
Bruh/here.txt
-
Size
342B
-
MD5
3fe93af384f22a007699e783e346cf5c
-
SHA1
725d9b373f91930b994452591b254e249ba5f220
-
SHA256
4a20e3359ee4534407ab337cbeeb10a09993350169b77469cb14e776ed48fd35
-
SHA512
ff97a6dd510560abb5b04885f2acf7038d8c60ce388e7ca04a19bfe16d87b2cd109d58bbd011c63c59945614a279ded2c9e390681f2fd5bc265b2553b81fad59
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2928 NOTEPAD.EXE