General
-
Target
Ransomware.NotPetya.zip
-
Size
5.6MB
-
Sample
241128-fllqcawnft
-
MD5
bfc6e4201c71cea924ac903000375286
-
SHA1
14acb03efe028667d5543cdcb81039dd537c77d1
-
SHA256
823f6586a8de88aa04e5518bd9aff97f64120b98d8d4757e31a8a13ed8b87713
-
SHA512
d20719d866c5434131ae417a935914cde3f429d9ed0ed9670c97325616cb0856d60033b9860b17252550b4ad2965e5e375f6ab5c2aa1417c821446f352b5f6c3
-
SSDEEP
98304:Xc7gCLAzRfD/3j7X9jyFvkFhtO2/pD7pqXE3ybRBMzj9cSP6apV0tcWC1:mgeAFb/TLByFvk9HYC9iapmeWC1
Malware Config
Targets
-
-
Target
ayonigga.cmd
-
Size
49B
-
MD5
90602be76b3fbe3b0bcf32b4370bf188
-
SHA1
981fe308e897d3c716b38620fa643126d15b50ab
-
SHA256
10be821ccacea04571770af6dcc7281e1f8cde1b969092bee42ef2ea813c1bc9
-
SHA512
ac04ff0d43efb5a8291e823a8486763b071fcea355573ce9becd74f14954b2bd1c15d0fa564113dfe97f0a72726188bcd75c5883c654581020d40c0761ed820b
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-