MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e097cde0f76df948f039584045acfa6bd7ef863141560815d12c3c6e6452dce4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nokoyawa


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: e097cde0f76df948f039584045acfa6bd7ef863141560815d12c3c6e6452dce4
SHA3-384 hash: d452fe7614e28b8be3b2989c1aea1362cccae8ded102f5e8446971544d50ab66303cfc1897e734ed47a252b74d4ed86e
SHA1 hash: 32c2ecf9703aec725034ab4a8a4c7b2944c1f0b7
MD5 hash: 2e936942613b9ef1a90b5216ef830fbf
humanhash: kilo-oven-maryland-october
File name:e097cde0f76df948f039584045acfa6bd7ef863141560815d12c3c6e6452dce4
Download: download sample
Signature Nokoyawa
File size:38'912 bytes
First seen:2022-03-11 23:05:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6787f57bc9873a02ce38d5daed45ad43 (2 x Nokoyawa)
ssdeep 768:tMs3yBEgMYosM5Ar/xY6Xc4FSimT3oDz/KVA5k1q:edB5bM5Ar/S6Xc4FnmT3oDz/KV
Threatray 1 similar samples on MalwareBazaar
TLSH T1D30350C7C65AAAF0E4BADB3E1255532BBA3530E68730E38383111D131AE36B9517D3D9
Reporter Arkbird_SOLG
Tags:exe nokoyawa Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
434
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file
Changing a file
Replacing files
Modifying an executable file
Encrypting user's files
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
CallSleep
CheckNumberOfProcessor
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypren filecoder ransomware wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
NOKOYAWA
Detection:
malicious
Classification:
rans
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Found ransom note / readme
Multi AV Scanner detection for submitted file
Yara detected NOKOYAWA Ransomware
Behaviour
Behavior Graph:
Threat name:
Win64.Ransomware.Nokoyawa
Status:
Malicious
First seen:
2022-02-13 03:40:04 UTC
File Type:
PE+ (Exe)
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware
Behaviour
Drops desktop.ini file(s)
Enumerates connected drives
Modifies extensions of user files
Unpacked files
SH256 hash:
e097cde0f76df948f039584045acfa6bd7ef863141560815d12c3c6e6452dce4
MD5 hash:
2e936942613b9ef1a90b5216ef830fbf
SHA1 hash:
32c2ecf9703aec725034ab4a8a4c7b2944c1f0b7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments