Behavioral task
behavioral1
Sample
b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866
Resource
win10v2004-20240802-en
General
-
Target
b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866
-
Size
3.6MB
-
MD5
4094abf934977da11aaf9aad22e301c0
-
SHA1
25382cf169f16dcd8d56932b3294719e49564ff7
-
SHA256
b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866
-
SHA512
cae8525fcc481e865444a85e5138bb32235f83338889c714fcead1f358d3bae992d42f3196184905a44a5c010fd31485bc85c931edda954cd0aec5e8ff60bd19
-
SSDEEP
12288:5ozA2n9dH5M2vkm0aFRv3pId9Ri9tvZJT3CqQrhryfQNRPaCieMjdvCJv1Vi0ZLS:5oFdvh1X/z
Malware Config
Signatures
-
Detected Mount Locker ransomware 1 IoCs
Processes:
resource yara_rule sample RANSOM_mountlocker -
Detects Zeppelin payload 1 IoCs
Processes:
resource yara_rule sample family_zeppelin -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
resource yara_rule sample masslogger_log_file -
Masslogger family
-
Mountlocker family
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule sample family_xmrig -
Xmrig family
-
Zeppelin family
Files
-
b0e762661eabb0e1fc4a6fa1e662361986db6f8892b9ae14cb17346f8c244866