Behavioral task
behavioral1
Sample
2025-03-24_9becbba391cd86ae4780bc0aa431d9c8_makop.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-24_9becbba391cd86ae4780bc0aa431d9c8_makop.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-24_9becbba391cd86ae4780bc0aa431d9c8_makop
-
Size
33KB
-
MD5
9becbba391cd86ae4780bc0aa431d9c8
-
SHA1
a45e6ebd801289a2c4c40dcd6ee70b7ebd3b042f
-
SHA256
948448af2f182b956f9501b445804ac26ae07e4fa84f88b4a98c53019017a208
-
SHA512
401453c5b0462b49d06352215aed3cede5c2e8b03d9661c581e6526275e22cdc9ae827b4dae96c6ae9a1f9e821b70f0ad86fba2072a1a4075c921362789136e6
-
SSDEEP
768:omOrfU5F/6xkelDL1rT4s1u9Kw8SgF7lRa53CqSf9HRUXimFGV+PcoD5Pyuzc7+e:qrfU5Fuke1L1Y0rlSgJlRW3CqSVRUfFZ
Malware Config
Signatures
-
MAKOP ransomware payload 1 IoCs
resource yara_rule sample family_makop -
Makop family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-24_9becbba391cd86ae4780bc0aa431d9c8_makop
Files
-
2025-03-24_9becbba391cd86ae4780bc0aa431d9c8_makop.exe windows:4 windows x86 arch:x86
b582f750f855e0159708f5d1f28929b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
kernel32
GetVolumeInformationW
CreateThread
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
TryEnterCriticalSection
CreateDirectoryW
Sleep
WriteFile
GetStdHandle
SetEndOfFile
SetFilePointerEx
ReadFile
GetFileSizeEx
MoveFileW
SetFileAttributesW
HeapAlloc
GetCurrentProcess
HeapFree
CloseHandle
GlobalAlloc
GlobalFree
PeekNamedPipe
TerminateThread
TerminateProcess
ExitProcess
GetModuleHandleW
GetProcAddress
GetModuleHandleA
GetCommandLineW
OpenProcess
GetModuleFileNameW
CreatePipe
GetEnvironmentVariableW
CreateProcessW
GetSystemWindowsDirectoryW
FindNextFileW
GetLocaleInfoW
GetExitCodeProcess
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetVersion
WaitForMultipleObjects
DeviceIoControl
FindClose
GetLastError
CreateFileW
GetLogicalDrives
WaitForSingleObject
SetErrorMode
GetDriveTypeW
FindFirstFileW
GetProcessHeap
SetHandleInformation
user32
GetWindowThreadProcessId
wsprintfA
EndDialog
ShowWindow
MessageBoxW
SetWindowTextA
EnableWindow
UnregisterHotKey
GetShellWindow
RegisterHotKey
GetWindowTextLengthW
CloseClipboard
GetWindowTextA
EmptyClipboard
GetDlgItem
OpenClipboard
SetClipboardData
wsprintfW
DialogBoxParamW
SetTimer
PostMessageW
SetWindowTextW
KillTimer
advapi32
CryptAcquireContextW
CryptSetKeyParam
CryptReleaseContext
CryptGenRandom
CryptDestroyKey
CryptDecrypt
OpenProcessToken
GetTokenInformation
SetTokenInformation
DuplicateTokenEx
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CryptImportKey
CryptEncrypt
shell32
ord680
CommandLineToArgvW
ShellExecuteExW
SHGetSpecialFolderPathW
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ