Behavioral task
behavioral1
Sample
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop
-
Size
47KB
-
MD5
5c48b93df8207e404318b292bfe910d1
-
SHA1
66bb4b52371c32b8015eea3b136816bdb221cd93
-
SHA256
9b0c1a34ff866490ee3db6e61fde2b97173dd95d02ba4fdceeacbe3e9441ee3c
-
SHA512
7a2020a613ec2aaee5332f1485837d55b593b9cc6b2db3db8c7c1e7b37ff496d378c2143d9c47ca7a89d63f7b8b1f5f3cb12d3dcc1668f8697090714ff07e98d
-
SSDEEP
768:YgqXOpw0VIWzh+1mQjPW+yHdykGlsxxGfnk70R6iOw4SbzxClJADVDwkvDx5TSBH:YvOpwmZUmQjCHdmKKR6iuoClJADVDrx6
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule sample family_makop -
Makop family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-21_5c48b93df8207e404318b292bfe910d1_makop
Files
-
2025-03-21_5c48b93df8207e404318b292bfe910d1_makop.exe windows:4 windows x86 arch:x86
612c025cf183797e4d504a30d48e9089
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
FindNextFileW
GetVolumeInformationW
CreateThread
TryEnterCriticalSection
Sleep
WriteFile
GetStdHandle
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
GetProcessHeap
GlobalAlloc
GlobalFree
GetVersion
PeekNamedPipe
GetComputerNameW
SetEvent
DeviceIoControl
GetProcAddress
LoadLibraryA
CreateEventW
OpenProcess
GetFileType
GetModuleHandleA
DuplicateHandle
GetCurrentProcessId
ExitProcess
GetModuleHandleW
GetCommandLineW
CreatePipe
GetEnvironmentVariableW
CreateProcessW
GetSystemWindowsDirectoryW
SetHandleInformation
GetLocaleInfoW
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
CreateDirectoryW
GetFileAttributesW
FindClose
GetLastError
CreateFileW
GetLogicalDrives
WaitForSingleObject
SetErrorMode
GetDriveTypeW
FindFirstFileW
CloseHandle
DeleteCriticalSection
EnterCriticalSection
TerminateProcess
GetExitCodeProcess
LeaveCriticalSection
TerminateThread
InitializeCriticalSection
user32
MessageBoxW
SetWindowTextA
SendMessageW
EnableWindow
UnregisterHotKey
SetWindowTextW
RegisterHotKey
ShowWindow
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
OpenClipboard
SetClipboardData
wsprintfW
DialogBoxParamW
GetWindowThreadProcessId
GetShellWindow
SetTimer
KillTimer
PostMessageW
wsprintfA
GetWindowTextLengthW
EndDialog
advapi32
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
CryptImportKey
CryptEncrypt
CryptDestroyKey
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CryptSetKeyParam
shell32
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
ole32
CoInitialize
CoUninitialize
CoTaskMemFree
netapi32
NetGetJoinInformation
NetApiBufferFree
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ