General
-
Target
b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe
-
Size
282KB
-
Sample
241125-s7aw7azqdr
-
MD5
e553d54a06009595a4ae269e9c96cbe0
-
SHA1
e762481794fa9096f4229f2eddfe0266bfc9f7ac
-
SHA256
b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435
-
SHA512
dba51a50f1b94ab8a7da9f0401993ba336b623afbbe9320a09f69fa89390889edca32bf237a9cc9f0b78e181790bbee005b43fc633feefc389bc4bc757f602b9
-
SSDEEP
3072:uvgIGSgSWSQ2qobyyBPgKlBkqdX2z6oXo:SgIGSgpSQ2J7PLlBkYXxoY
Behavioral task
behavioral1
Sample
b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Public\Libraries\A58086-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files (x86)\Microsoft\Edge\316108-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe
-
Size
282KB
-
MD5
e553d54a06009595a4ae269e9c96cbe0
-
SHA1
e762481794fa9096f4229f2eddfe0266bfc9f7ac
-
SHA256
b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435
-
SHA512
dba51a50f1b94ab8a7da9f0401993ba336b623afbbe9320a09f69fa89390889edca32bf237a9cc9f0b78e181790bbee005b43fc633feefc389bc4bc757f602b9
-
SSDEEP
3072:uvgIGSgSWSQ2qobyyBPgKlBkqdX2z6oXo:SgIGSgpSQ2J7PLlBkYXxoY
-
Detected Netwalker Ransomware
Detected unpacked Netwalker executable.
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7446) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-