General
-
Target
2024-10-04_9d870eeb02e4bd353ce8a71e4811a107_avoslocker_cobalt-strike_ramnit
-
Size
776KB
-
Sample
241004-jcpx7awape
-
MD5
9d870eeb02e4bd353ce8a71e4811a107
-
SHA1
75d2b32451981fa90b7d00717096aa876f2f9ea3
-
SHA256
89a21045f57524d9380d452c8cedd66775317104604cd252033a5ab017180ebb
-
SHA512
49b3488276cc89e070cd36f90b3087d3c5435ddc3469b00e79702acf793b872450fb12cdcf32ca5492b8b0addcd5edf56a7b279a11742b28e35e7923ca489f3e
-
SSDEEP
12288:uubXcwafJcLln5QwnVWqqPIBONhxsU/EMOxpOHW/9hr4:uurP90r/xsU/EDoS9hk
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_9d870eeb02e4bd353ce8a71e4811a107_avoslocker_cobalt-strike_ramnit.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-10-04_9d870eeb02e4bd353ce8a71e4811a107_avoslocker_cobalt-strike_ramnit
-
Size
776KB
-
MD5
9d870eeb02e4bd353ce8a71e4811a107
-
SHA1
75d2b32451981fa90b7d00717096aa876f2f9ea3
-
SHA256
89a21045f57524d9380d452c8cedd66775317104604cd252033a5ab017180ebb
-
SHA512
49b3488276cc89e070cd36f90b3087d3c5435ddc3469b00e79702acf793b872450fb12cdcf32ca5492b8b0addcd5edf56a7b279a11742b28e35e7923ca489f3e
-
SSDEEP
12288:uubXcwafJcLln5QwnVWqqPIBONhxsU/EMOxpOHW/9hr4:uurP90r/xsU/EDoS9hk
-
Executes dropped EXE
-
Loads dropped DLL
-