General
-
Target
SQLi Dumper V10.3.zip
-
Size
3.6MB
-
Sample
250206-rhe9yaxjgv
-
MD5
e7841c492d87017888ead72f8e21cc64
-
SHA1
f00d94831b114767f4522a7884adcfcb4a9d98ac
-
SHA256
e5e082480d493d9d8f87ba60943f01d220e4f8f41b4af71e8dd0e5bd8169809b
-
SHA512
50664d532fad265b32733da8e866894b58acf2760492e99f8cb7c638823c976cbc496a325d61e9729af42329c60e8648b30ebd43f292f8b985a78abbf5d0c926
-
SSDEEP
98304:lZz5UUds8wXw00OaDX1+ulJ+4hG/jMuI9XtkYj0Lo7on4s:lZz548w10OOX1+uZh+j72H007Ps
Behavioral task
behavioral1
Sample
SQLi Dumper V10.3.zip
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
SQLi Dumper V10.3.zip
-
Size
3.6MB
-
MD5
e7841c492d87017888ead72f8e21cc64
-
SHA1
f00d94831b114767f4522a7884adcfcb4a9d98ac
-
SHA256
e5e082480d493d9d8f87ba60943f01d220e4f8f41b4af71e8dd0e5bd8169809b
-
SHA512
50664d532fad265b32733da8e866894b58acf2760492e99f8cb7c638823c976cbc496a325d61e9729af42329c60e8648b30ebd43f292f8b985a78abbf5d0c926
-
SSDEEP
98304:lZz5UUds8wXw00OaDX1+ulJ+4hG/jMuI9XtkYj0Lo7on4s:lZz548w10OOX1+uZh+j72H007Ps
Score10/10-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-