General
-
Target
2025-01-22_005d09ed67681b222e581e8741fc1d64_mailto
-
Size
57KB
-
Sample
250122-nhgk8avlal
-
MD5
005d09ed67681b222e581e8741fc1d64
-
SHA1
22f1ae3021a7b64c66a06f857ca6980440904672
-
SHA256
17317e47af9ecac9efa465dfe13e130fc1285160974041a75e0a90e21908d1af
-
SHA512
01b32a89435269ee3090595a02aee190715bf68315705b1e665d6d7507a6d84c271169e7e267faaa97e519713c3c563b9fc81bef208e2bd13334a7bd9f33b0ec
-
SSDEEP
1536:Pokamp8C3eGQYVynB7pc21bV5Mbem9zM0gh2ZHHTsrt:PoxmyeDQYQB+21bVabemtM0Y0zc
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-22_005d09ed67681b222e581e8741fc1d64_mailto.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-22_005d09ed67681b222e581e8741fc1d64_mailto.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Public\Music\Sample Music\B5DF00-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files (x86)\Common Files\Oracle\Java\B86211-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
2025-01-22_005d09ed67681b222e581e8741fc1d64_mailto
-
Size
57KB
-
MD5
005d09ed67681b222e581e8741fc1d64
-
SHA1
22f1ae3021a7b64c66a06f857ca6980440904672
-
SHA256
17317e47af9ecac9efa465dfe13e130fc1285160974041a75e0a90e21908d1af
-
SHA512
01b32a89435269ee3090595a02aee190715bf68315705b1e665d6d7507a6d84c271169e7e267faaa97e519713c3c563b9fc81bef208e2bd13334a7bd9f33b0ec
-
SSDEEP
1536:Pokamp8C3eGQYVynB7pc21bV5Mbem9zM0gh2ZHHTsrt:PoxmyeDQYQB+21bVabemtM0Y0zc
Score10/10-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Renames multiple (7368) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-