General
-
Target
2025-01-28_2e2f5fe8aba42ba7a4eb972e201be179_mailto
-
Size
69KB
-
Sample
250128-bt2djssmbv
-
MD5
2e2f5fe8aba42ba7a4eb972e201be179
-
SHA1
5be60349686e59140f33a071c80405da8952ad30
-
SHA256
60deeaf4df6f3ca05f445a72664c95dd6aa66584716253f7b86cef516e13016a
-
SHA512
4039fd176206f7879a80aa9eaa0a338ac0f845ba1b446966c7577d367149f3163526aea143e5c68ed45ee6a22080431304a134b408464479c1b9140ab523db54
-
SSDEEP
1536:4xa8XQ408kLUiQKovO5bGU+hhOZuIWcz46ZOtByKbCKrQQipc:oa8XK8yJQKmO5bZkhOZu1cziByKbCk/
Behavioral task
behavioral1
Sample
2025-01-28_2e2f5fe8aba42ba7a4eb972e201be179_mailto.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-28_2e2f5fe8aba42ba7a4eb972e201be179_mailto.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\A4D0B4-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Users\Public\Libraries\58C38E-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
2025-01-28_2e2f5fe8aba42ba7a4eb972e201be179_mailto
-
Size
69KB
-
MD5
2e2f5fe8aba42ba7a4eb972e201be179
-
SHA1
5be60349686e59140f33a071c80405da8952ad30
-
SHA256
60deeaf4df6f3ca05f445a72664c95dd6aa66584716253f7b86cef516e13016a
-
SHA512
4039fd176206f7879a80aa9eaa0a338ac0f845ba1b446966c7577d367149f3163526aea143e5c68ed45ee6a22080431304a134b408464479c1b9140ab523db54
-
SSDEEP
1536:4xa8XQ408kLUiQKovO5bGU+hhOZuIWcz46ZOtByKbCKrQQipc:oa8XK8yJQKmO5bZkhOZu1cziByKbCk/
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7442) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-