General
-
Target
2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto
-
Size
66KB
-
Sample
250129-ap2m3svqaw
-
MD5
2be2af23b313b80536e9ca3c12704d6c
-
SHA1
5ce36159fb34f79df9bd8ba43afb8c21a059052c
-
SHA256
16e6fc7f6bf936eda5723551ea9d0aee9d83e265c1e70cc2d66198be8e1400d8
-
SHA512
384b55e59933ca35a4f6db970e6ac1169e016b40739c7b15f4a592e11fff8c7d4afa730cd2b0b78ad1ea18e29c881028228683b55742be76bbae65102be08853
-
SSDEEP
1536:Tn2v0CaaFjJn/zk4XHnnzxLhOZ3w4qwiDKKVqmfeL:TIK+N/44XHnzthOZ37qwiDo
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\Office14\3082\367114-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\ProgramData\Microsoft\MF\E524DE-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto
-
Size
66KB
-
MD5
2be2af23b313b80536e9ca3c12704d6c
-
SHA1
5ce36159fb34f79df9bd8ba43afb8c21a059052c
-
SHA256
16e6fc7f6bf936eda5723551ea9d0aee9d83e265c1e70cc2d66198be8e1400d8
-
SHA512
384b55e59933ca35a4f6db970e6ac1169e016b40739c7b15f4a592e11fff8c7d4afa730cd2b0b78ad1ea18e29c881028228683b55742be76bbae65102be08853
-
SSDEEP
1536:Tn2v0CaaFjJn/zk4XHnnzxLhOZ3w4qwiDKKVqmfeL:TIK+N/44XHnzthOZ37qwiDo
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7436) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-