Static task
static1
17 signatures
General
-
Target
09259c22461ddba55ed256013930beccbbf6061875500538962a8da6d0d05b22
-
Size
10.2MB
-
MD5
fa98cf4a12544e50b472be6db79a66ef
-
SHA1
5f3db8bbed3c529ecc3cbc27fc8f3a036f0284c2
-
SHA256
09259c22461ddba55ed256013930beccbbf6061875500538962a8da6d0d05b22
-
SHA512
e2cf4c4bf56d0e09e7514ec3d21dc8b5934e30b30ce06c4e402a4052f6f4347498b4b3ceb2e57cbc07527fbf961306ac66ef55accbe23be08559f4408c79de0c
-
SSDEEP
196608:Gqv7fQjtjSyqVhdWT3eUR03Fzjb0u3rK74yBngXp64Yjb2ERW6VxF:6z
Malware Config
Signatures
-
Detected Mount Locker ransomware 1 IoCs
resource yara_rule sample RANSOM_mountlocker -
Detects Zeppelin payload 1 IoCs
resource yara_rule sample family_zeppelin -
HelloKitty ELF 1 IoCs
resource yara_rule sample family_hellokitty_elf -
Hellokitty family
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
resource yara_rule sample masslogger_log_file -
Masslogger family
-
Merlin family
-
Merlin payload 1 IoCs
resource yara_rule sample family_merlin -
Mountlocker family
-
NetFilter payload 1 IoCs
resource yara_rule sample netfilter_payload -
NetWire RAT payload 1 IoCs
resource yara_rule sample netwire -
Netfilter family
-
Netwire family
-
Remcos family
-
XMRig Miner payload 1 IoCs
resource yara_rule sample family_xmrig -
Xmrig family
-
Zeppelin family
Files
-
09259c22461ddba55ed256013930beccbbf6061875500538962a8da6d0d05b22