Resubmissions
21/02/2025, 15:15
250221-sm3fpstpcv 10Behavioral task
behavioral1
Sample
sample.js
Resource
win10ltsc2021-20250218-en
1 signatures
60 seconds
General
-
Target
f_002bd8
-
Size
150KB
-
MD5
6eeb393fffede6b434fe73ff813749cd
-
SHA1
7d142b33689615f7b519fa8cf7de5e4ff4511068
-
SHA256
200857adb30be019a2c67416124d32d4b99c0017ae7f7599639d0274d08ad36d
-
SHA512
7c8e73cca89a00a2c8954a3c04f3011d9d495589a5505337c97bc563ec56d266fea8fd24594ec5fd4b99a011a9a848b37881e5092ddeb8036fae746d775fe656
-
SSDEEP
3072:dCndB2RmZ/NEeif7fcowYA1Hk67MskEdAC8Dxu6xzpcqlVf:dCa2/N5iTfcoid7zKC8DAjqlVf
Malware Config
Signatures
-
Detected Mount Locker ransomware 1 IoCs
resource yara_rule static1/unpack001/sample RANSOM_mountlocker -
Detects Zeppelin payload 1 IoCs
resource yara_rule static1/unpack001/sample family_zeppelin -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
resource yara_rule static1/unpack001/sample masslogger_log_file -
Masslogger family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule static1/unpack001/sample modiloader_stage2 -
Modiloader family
-
Mountlocker family
-
XMRig Miner payload 1 IoCs
resource yara_rule static1/unpack001/sample family_xmrig -
Xmrig family
-
Zeppelin family
Files
-
f_002bd8.gz
-
sample.js