MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Nokoyawa


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab
SHA3-384 hash: 20f2e6eb3d472ee0cd69a56ee4e6a1ed84590791a401ec28bf0c1cdc5a6f83314ddd8df0e3b805ea3549fc3998281ff8
SHA1 hash: 2d92468b5982fbbb39776030fab6ac35c4a9b889
MD5 hash: 22a006b6d19558c3cebd708b2b0543bc
humanhash: berlin-zebra-freddie-early
File name:fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab.bin
Download: download sample
Signature Nokoyawa
File size:38'912 bytes
First seen:2022-03-11 23:06:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6787f57bc9873a02ce38d5daed45ad43 (2 x Nokoyawa)
ssdeep 768:nMs3yBEgMYosM5Ar/xY6Xc4FSimT3oDz/KVA5/yX:MdB5bM5Ar/S6Xc4FnmT3oDz/KV
Threatray 1 similar samples on MalwareBazaar
TLSH T13A0340C7C65AAAF0E4BADB3E1255532BBA3530E68730E38383111D131AE36B9517D3D9
Reporter Arkbird_SOLG
Tags:exe nokoyawa Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
456
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab.zip
Verdict:
No threats detected
Analysis date:
2022-03-12 10:18:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Changing a file
Replacing files
Sending a custom TCP request
Modifying an executable file
Encrypting user's files
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckNumberOfProcessor
CallSleep
CheckCmdLine
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
NOKOYAWA
Detection:
malicious
Classification:
rans
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Found ransom note / readme
Multi AV Scanner detection for submitted file
Yara detected NOKOYAWA Ransomware
Behaviour
Behavior Graph:
Threat name:
Win64.Ransomware.Crypren
Status:
Malicious
First seen:
2022-02-06 17:06:02 UTC
File Type:
PE+ (Exe)
AV detection:
28 of 41 (68.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware
Behaviour
Drops desktop.ini file(s)
Enumerates connected drives
Modifies extensions of user files
Unpacked files
SH256 hash:
fefd1117c2f0ab88d8090bc3bdcb8213daf8065f12de1ee6a6c641e888a27eab
MD5 hash:
22a006b6d19558c3cebd708b2b0543bc
SHA1 hash:
2d92468b5982fbbb39776030fab6ac35c4a9b889
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments