Static task
static1
Behavioral task
behavioral1
Sample
KatyushaRansomware.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
KatyushaRansomware.exe
Resource
win10v2004-20240802-en
General
-
Target
KatyushaRansomware.bin
-
Size
2.4MB
-
MD5
7f87db33980c0099739de40d1b725500
-
SHA1
f0626999b7f730f9003ac1389d3060c50068da5a
-
SHA256
d00ee0e6eab686424f8d383e151d22005f19adbda5b380a75669629e32fe12a6
-
SHA512
1bf8e63a09ee7618102982a1d8c39c2eada1e7c52452d0cadb0df9010421799171880580dd6e4d5fb371d314ee7676d438ab827ef1695bb9de95835ac7cb47f8
-
SSDEEP
49152:tzlhgyBIjVpPZHZlPpLPk0vglJIAc/8KYBsxdO0G7x+dP1Y+:zy9jRZlFknvzcEKY8dOD7x8NY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource KatyushaRansomware.bin
Files
-
KatyushaRansomware.bin.exe windows:5 windows x86 arch:x86
9586355d3c001552543f5fa27b1cb240
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
ws2_32
listen
user32
wsprintfA
advapi32
CryptEncrypt
shell32
ShellExecuteA
iphlpapi
GetIpAddrTable
wldap32
ord32
Sections
.MPRESS1 Size: 2.4MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE