General
-
Target
2025-03-20_6006725a2daa0b01a4af2fddf58db57b_mailto
-
Size
69KB
-
Sample
250320-lkehjazsft
-
MD5
6006725a2daa0b01a4af2fddf58db57b
-
SHA1
2e9c40f5bc4f7d8c543cf5a93123fc2794f26a6a
-
SHA256
448f9d5980c6e327d5cf3e3286381df157876c7f4a748a31038d5bee5479c901
-
SHA512
0ee22efada8a3be89b6b0c6241c63ba57319c6ef5cbab5df6d2637d1b52a933ad70b88eb7a554f80cfb87f3c1d556c902a5e81415b6ce3b41a67becfd3313e29
-
SSDEEP
1536:QuCWRxL7hbUiQfovePbUU+hhOZuIWiFp+ZfaBZebC33O+alcBc:rCWf7VJQfmePbvkhOZu1iFBBZebC3KlR
Behavioral task
behavioral1
Sample
2025-03-20_6006725a2daa0b01a4af2fddf58db57b_mailto.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-03-20_6006725a2daa0b01a4af2fddf58db57b_mailto.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\ProgramData\Microsoft\User Account Pictures\CC1075-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files (x86)\Common Files\Oracle\Java\1875E6-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Targets
-
-
Target
2025-03-20_6006725a2daa0b01a4af2fddf58db57b_mailto
-
Size
69KB
-
MD5
6006725a2daa0b01a4af2fddf58db57b
-
SHA1
2e9c40f5bc4f7d8c543cf5a93123fc2794f26a6a
-
SHA256
448f9d5980c6e327d5cf3e3286381df157876c7f4a748a31038d5bee5479c901
-
SHA512
0ee22efada8a3be89b6b0c6241c63ba57319c6ef5cbab5df6d2637d1b52a933ad70b88eb7a554f80cfb87f3c1d556c902a5e81415b6ce3b41a67becfd3313e29
-
SSDEEP
1536:QuCWRxL7hbUiQfovePbUU+hhOZuIWiFp+ZfaBZebC33O+alcBc:rCWf7VJQfmePbvkhOZu1iFBBZebC3KlR
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7419) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-