MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 006c9ba4ca0218e7bd2c7c21653497d3215bbeefbc1f5c2781549b306bab8e5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nemty


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 006c9ba4ca0218e7bd2c7c21653497d3215bbeefbc1f5c2781549b306bab8e5e
SHA3-384 hash: a2468e34674034c3ebc7b37c5e8214164817ad01d43319fe904ff055d225047b9d673ba923ea03c144bf08684effaf65
SHA1 hash: 838bb61c5db51ff145e436cd04bea3af018b8478
MD5 hash: e16ff2ea93492d60723b3caa1e1dafdb
humanhash: indigo-tango-whiskey-jupiter
File name:006c9ba4ca0218e7bd2c7c21653497d3215bbeefbc1f5c2781549b306bab8e5e
Download: download sample
Signature Nemty
File size:3'180'032 bytes
First seen:2020-11-08 09:41:50 UTC
Last seen:2020-11-08 11:45:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 93a138801d9601e4c36e6274c8b9d111 (11 x CobaltStrike, 9 x Snatch, 8 x LaplasClipper)
ssdeep 49152:L/2+7jcJB+bBGu52PS33ZciJycRaL5QWaX7fOmY2+ukXksU6Fw:b7jcJGGuppck17KBuqU6i
Threatray 8 similar samples on MalwareBazaar
TLSH 6BE55B06FCE618F6CABEF130857192237671786943313BD71F94997A2A6ABD42E3D340
Reporter JAMESWT_WT
Tags:DIG IN VISION SP Z O O nemty Ransomware signed

Code Signing Certificate

Organisation:DIG IN VISION SP Z O O
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2020-11-03T00:00:00Z
Valid to:2021-11-03T23:59:59Z
Serial number: fc7065abf8303fb472b8af85918f5c24
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: edaa880d9a544e8466b94581c7ec519bdc35bf6a1bcad6cd93e0926d454c1d6f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'877
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Changing a file
Sending a UDP request
Reading critical registry keys
Creating a file in the mass storage device
Stealing user critical data
Encrypting user's files
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
72 / 100
Signature
Creates files in the recycle bin to hide itself
Creates files inside the volume driver (system volume information)
Found Tor onion address
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Writes many files with high entropy
Behaviour
Behavior Graph:
Threat name:
Win64.Ransomware.Encoder
Status:
Malicious
First seen:
2020-11-07 14:28:31 UTC
File Type:
PE+ (Exe)
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware
Behaviour
Drops desktop.ini file(s)
Modifies extensions of user files
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments