General

  • Target

    2024-06-25_1ce3b67e179c8420bd5b31e75b4427ca_blackcat_maui_nokoyawa_wannacry

  • Size

    13.4MB

  • MD5

    1ce3b67e179c8420bd5b31e75b4427ca

  • SHA1

    4090622f0eadc1b420aa5d55e31ca5cd45e05f12

  • SHA256

    df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3

  • SHA512

    c708cc271fad1ecd29fccb010a34f54ba7b885d8827351a5d8be49f4781185248e789c3e35fa1c7862fdc0bf303e1d97f2585023e0b9fd14db3181f55d276f5f

  • SSDEEP

    98304:aRqeZPPm0Rgmt7M17Lu1zdfj7zyg5oo5AZx8U8qPoBhLTlL4DQWVYHL9fu4h84MR:aMygJ9edfbhSo5Kp8qPKlL8QgYVhqn

Malware Config

Signatures

  • Blackcat family
  • Chaos Ransomware 1 IoCs
  • Chaos family
  • Detect MafiaWare666 ransomware 1 IoCs
  • Detect Maui ransomware 1 IoCs
  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Mafiaware666 family
  • Maui family
  • Njrat family
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-25_1ce3b67e179c8420bd5b31e75b4427ca_blackcat_maui_nokoyawa_wannacry
    .exe windows:5 windows x64 arch:x64

    aa466c044f0d2d2f6270070fe1bddf7b


    Headers

    Imports

    Sections