C:\Users\Administrator\Desktop\New folder\Release\NEFILIM.pdb
Behavioral task
behavioral1
Sample
net-filim-patched-noencrypt.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
net-filim-patched-noencrypt.exe
Resource
win10v2004-20240508-en
General
-
Target
net-filim-patched-noencrypt.zip
-
Size
38KB
-
MD5
b0304c308048bdf0decb0898bf8197f1
-
SHA1
5a4d336f0075e0435a77aed5047ffcca83cbc12c
-
SHA256
ecf767537b8eddd232d369232d25480668276dbc2e6e69065401151db0072848
-
SHA512
28883b23ebba780147091cfeb4b1c0de9a03746cdc35193aa290e47c2c65a86258ff6dce70f9b4330b7ab34663d8786b825f8b54e69ba522e6293a9584d8c653
-
SSDEEP
768:KHVHvwpKtV2E4Zqu4WlYdUq4eEpWLY4gqWDqLQb0wTqGwovB/t6b:KBWwxhuihrMWLY4gPDqUy1cBV6b
Malware Config
Signatures
-
Nefilim family
-
Nefilim ransomware executable 1 IoCs
File contains patterns typical of Nefilim samples.
Processes:
resource yara_rule static1/unpack001/net-filim-patched-noencrypt.exe nefilim_ransomware -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/net-filim-patched-noencrypt.exe
Files
-
net-filim-patched-noencrypt.zip.zip
Password: infected
-
net-filim-patched-noencrypt.exe.exe windows:5 windows x86 arch:x86
3ee8aa55414a94ea0a841ea0069bd261
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
GetProcessHeap
WriteFile
Sleep
ReadFile
CreateFileW
GetFileSizeEx
GetStdHandle
GetLastError
SetLastError
GetProcAddress
MoveFileW
GetLogicalDrives
LoadLibraryA
lstrcmpiW
FindNextFileW
CloseHandle
CreateThread
ExitProcess
GetModuleFileNameW
WideCharToMultiByte
ExitThread
MultiByteToWideChar
CreateMutexA
WaitForSingleObject
HeapFree
SetFilePointerEx
GetCurrentProcess
HeapAlloc
GetDriveTypeW
lstrlenA
FindFirstFileW
FindClose
GetSystemDefaultLangID
GetStringTypeW
LCMapStringW
IsValidCodePage
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetModuleHandleW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
HeapReAlloc
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
advapi32
CryptDecrypt
CryptCreateHash
CryptDeriveKey
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptAcquireContextA
CryptReleaseContext
CryptHashData
shell32
ShellExecuteW
shlwapi
PathFindExtensionW
PathIsDirectoryW
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ