Static task
static1
Behavioral task
behavioral1
Sample
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
Resource
win7-20241023-en
Errors
General
-
Target
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
Size
8.5MB
-
MD5
2d690d32e637c43a18aa8f4f2fd28e48
-
SHA1
f8a5f75a34d2751c0e7195cd4adabddc1ece465e
-
SHA256
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
SHA512
2641192c4ebb0a66fdf6a9be16ccfc38a4cd98a32467d5b6e719c73b2893a28888b7c9c77d3db3a0d2e93d14408081bdc92238dc3a5b1479229843f354c7305e
-
SSDEEP
196608:exCyu9hdCjcHsm2gTEE/OBBZVaMKb0QqNnJi6lWzVYK5P6qwpxFlWavvy7:ervy
Malware Config
Signatures
-
BlackNET payload 1 IoCs
resource yara_rule sample family_blacknet -
Blacknet family
-
Blister family
-
Detect Blister loader x32 1 IoCs
resource yara_rule sample family_blister_x32 -
Detect KandyKorn payload 1 IoCs
resource yara_rule sample family_kandykorn -
Detect XtremeRAT payload 1 IoCs
resource yara_rule sample family_xtremerat -
Detected Mount Locker ransomware 1 IoCs
resource yara_rule sample RANSOM_mountlocker -
Detects PseudoManuscrypt payload 1 IoCs
resource yara_rule sample family_pseudomanuscrypt -
Detects Zeppelin payload 1 IoCs
resource yara_rule sample family_zeppelin -
Dridex family
-
Guloader family
-
Guloader payload 1 IoCs
resource yara_rule sample family_guloader -
HelloKitty ELF 1 IoCs
resource yara_rule sample family_hellokitty_elf -
Hellokitty family
-
Kandykorn family
-
LoaderBot executable 1 IoCs
resource yara_rule sample loaderbot -
Loaderbot family
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
resource yara_rule sample masslogger_log_file -
Masslogger family
-
Merlin family
-
Merlin payload 1 IoCs
resource yara_rule sample family_merlin -
Mimikatz family
-
Mountlocker family
-
Nefilim family
-
Nefilim ransomware executable 1 IoCs
File contains patterns typical of Nefilim samples.
resource yara_rule sample nefilim_ransomware -
NetFilter Dropper 1 IoCs
resource yara_rule sample netfilter_dropper -
NetFilter payload 1 IoCs
resource yara_rule sample netfilter_payload -
NetWire RAT payload 1 IoCs
resource yara_rule sample netwire -
Netfilter family
-
Netwire family
-
Pseudomanuscrypt family
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Royal Ransomware 1 IoCs
resource yara_rule sample family_royal -
Royal family
-
Sodinokibi family
-
Sodinokibi/Revil sample 1 IoCs
resource yara_rule sample family_sodinokobi -
XMRig Miner payload 1 IoCs
resource yara_rule sample family_xmrig -
Xmrig family
-
Xtremerat family
-
Zeppelin family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule sample mimikatz -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule sample rezer0 -
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule sample patched_upx
Files
-
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9