General
-
Target
aee5f898961105ff97a05c7f847b15ae2e29c9270a20f46caf24e525216d6a17.exe
-
Size
282KB
-
Sample
241124-2w7w8azpcn
-
MD5
38f3d7cdc3ec83dfd3b8309b569481bc
-
SHA1
4398b03f857a45af838f0d2b8094a367708c0968
-
SHA256
aee5f898961105ff97a05c7f847b15ae2e29c9270a20f46caf24e525216d6a17
-
SHA512
14d6d4c611a910c5e9b83c58f42acdee9dd69356066dabdef7386d5c8dc67ab9e153f2e906097f44324babfbf8c5ea0b7156c0befeecb39eaf639fefa24c0858
-
SSDEEP
3072:uvgIGSgSWSQ2qobyyBPgKlBkqdX2z6oXo:SgIGSgpSQ2J7PLlBkYXxoY
Behavioral task
behavioral1
Sample
aee5f898961105ff97a05c7f847b15ae2e29c9270a20f46caf24e525216d6a17.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aee5f898961105ff97a05c7f847b15ae2e29c9270a20f46caf24e525216d6a17.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files (x86)\MSBuild\BA3AAF-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\CA3D36-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
aee5f898961105ff97a05c7f847b15ae2e29c9270a20f46caf24e525216d6a17.exe
-
Size
282KB
-
MD5
38f3d7cdc3ec83dfd3b8309b569481bc
-
SHA1
4398b03f857a45af838f0d2b8094a367708c0968
-
SHA256
aee5f898961105ff97a05c7f847b15ae2e29c9270a20f46caf24e525216d6a17
-
SHA512
14d6d4c611a910c5e9b83c58f42acdee9dd69356066dabdef7386d5c8dc67ab9e153f2e906097f44324babfbf8c5ea0b7156c0befeecb39eaf639fefa24c0858
-
SSDEEP
3072:uvgIGSgSWSQ2qobyyBPgKlBkqdX2z6oXo:SgIGSgpSQ2J7PLlBkYXxoY
-
Detected Netwalker Ransomware
Detected unpacked Netwalker executable.
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7385) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-