Source: p2pWin.exe, type: SAMPLE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: p2pWin.exe, type: SAMPLE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: p2pWin.exe, type: SAMPLE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: p2pWin.exe, type: SAMPLE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: p2pWin.exe, type: SAMPLE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: p2pWin.exe, type: SAMPLE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 0.2.p2pWin.exe.4d890.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.1.p2pWin.exe.4c050.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.1.p2pWin.exe.4d890.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 4.0.F2CD.tmp.7ff72e900000.0.unpack, type: UNPACKEDPE | Matched rule: Auto-generated rule - file 2f8c54f9fa8e47596a3beff0031f85360e56840c77f71c6a573ace6f46412035 Author: Florian Roth |
Source: 0.0.p2pWin.exe.4c050.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 1.2.rundll32.exe.2cf9840.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 1.2.rundll32.exe.2e67860.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.0.p2pWin.exe.4d890.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 1.2.rundll32.exe.2cfb080.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 0.2.p2pWin.exe.4c050.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 4.2.F2CD.tmp.7ff72e900000.0.unpack, type: UNPACKEDPE | Matched rule: Auto-generated rule - file 2f8c54f9fa8e47596a3beff0031f85360e56840c77f71c6a573ace6f46412035 Author: Florian Roth |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Detects BadRabbit Ransomware Author: Florian Roth |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Detects new NotPetya Ransomware variant from June 2017 Author: Florian Roth |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya Author: ReversingLabs |
Source: 00000001.00000002.1670422121.0000000002E5D000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 00000001.00000002.1670422121.0000000002E5D000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 00000001.00000002.1670422121.0000000002E5D000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 00000000.00000000.1627434367.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 00000000.00000000.1627434367.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 00000000.00000000.1627434367.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 00000000.00000001.1627535297.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 00000000.00000001.1627535297.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 00000000.00000001.1627535297.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 00000000.00000002.1631035398.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 00000000.00000002.1631035398.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 00000000.00000002.1631035398.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: 00000001.00000002.1670184712.0000000002CCA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: 00000001.00000002.1670184712.0000000002CCA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar shellcode Author: patrick user |
Source: 00000001.00000002.1670184712.0000000002CCA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: rule to hit on the xored doublepulsar dll injection shellcode Author: patrick user |
Source: Process Memory Space: p2pWin.exe PID: 5320, type: MEMORYSTR | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: Process Memory Space: rundll32.exe PID: 2284, type: MEMORYSTR | Matched rule: probable petya ransomware using eternalblue, wmic, psexec Author: ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick |
Source: p2pWin.exe, type: SAMPLE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: p2pWin.exe, type: SAMPLE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: p2pWin.exe, type: SAMPLE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: p2pWin.exe, type: SAMPLE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: p2pWin.exe, type: SAMPLE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: p2pWin.exe, type: SAMPLE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 0.2.p2pWin.exe.4d890.3.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.1.p2pWin.exe.4c050.2.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.1.p2pWin.exe.4d890.1.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 1.2.rundll32.exe.2ce5020.2.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.1.p2pWin.exe.37830.0.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 4.0.F2CD.tmp.7ff72e900000.0.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Mimikatz_Comp date = 2017-10-25, hash1 = 2f8c54f9fa8e47596a3beff0031f85360e56840c77f71c6a573ace6f46412035, author = Florian Roth, description = Auto-generated rule - file 2f8c54f9fa8e47596a3beff0031f85360e56840c77f71c6a573ace6f46412035, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.4c050.1.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2cf9840.1.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2e67860.4.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.4d890.2.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2cfb080.0.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.1.p2pWin.exe.37830.0.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 1.2.rundll32.exe.2e50000.3.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 0.2.p2pWin.exe.4c050.1.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 4.2.F2CD.tmp.7ff72e900000.0.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Mimikatz_Comp date = 2017-10-25, hash1 = 2f8c54f9fa8e47596a3beff0031f85360e56840c77f71c6a573ace6f46412035, author = Florian Roth, description = Auto-generated rule - file 2f8c54f9fa8e47596a3beff0031f85360e56840c77f71c6a573ace6f46412035, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.2.p2pWin.exe.37830.2.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.0.p2pWin.exe.37830.3.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 1.2.rundll32.exe.2ce5020.2.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.2.p2pWin.exe.37830.2.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.0.p2pWin.exe.37830.3.raw.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.2.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: BadRabbit_Gen date = 2017-10-25, hash3 = 630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da, hash2 = 579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648, hash1 = 8ebc97e05c8e1073bda2efb6f4d00ad7e789260afa2c276f0c72740b838a0a93, author = Florian Roth, description = Detects BadRabbit Ransomware, reference = https://pastebin.com/Y7pJv3tK, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: NotPetya_Ransomware_Jun17 date = 2017-06-27, hash3 = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1, hash2 = 45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0, hash1 = 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745, author = Florian Roth, description = Detects new NotPetya Ransomware variant from June 2017, reference = https://goo.gl/h6iaGj, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 0.0.p2pWin.exe.30000.0.unpack, type: UNPACKEDPE | Matched rule: Win32_Ransomware_NotPetya tc_detection_name = NotPetya, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware |
Source: 00000001.00000002.1670422121.0000000002E5D000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 00000001.00000002.1670422121.0000000002E5D000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000001.00000002.1670422121.0000000002E5D000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000000.00000000.1627434367.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 00000000.00000000.1627434367.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000000.00000000.1627434367.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000000.00000001.1627535297.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 00000000.00000001.1627535297.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000000.00000001.1627535297.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000000.00000002.1631035398.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 00000000.00000002.1631035398.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000000.00000002.1631035398.0000000000036000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000001.00000002.1670184712.0000000002CCA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: 00000001.00000002.1670184712.0000000002CCA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: doublepulsarxor_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: 00000001.00000002.1670184712.0000000002CCA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: doublepulsardllinjection_petya date = 2017-06-28, author = patrick user, description = rule to hit on the xored doublepulsar dll injection shellcode, reference1 = https://www.boozallen.com/s/insight/publication/the-petya-ransomware-outbreak.html, reference2 = https://www.boozallen.com/content/dam/boozallen_site/sig/pdf/white-paper/rollup-of-booz-allen-petya-research.pdf, company = booz allen hamilton, hash = 64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1 |
Source: Process Memory Space: p2pWin.exe PID: 5320, type: MEMORYSTR | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |
Source: Process Memory Space: rundll32.exe PID: 2284, type: MEMORYSTR | Matched rule: fe_cpe_ms17_010_ransomware date = 2017-06-27, author = ian.ahl@fireeye.com @tekdefense, nicholas.carr@mandiant.com @itsreallynick, description = probable petya ransomware using eternalblue, wmic, psexec, version = 1.1, reference = https://www.fireeye.com/blog/threat-research/2017/06/petya-ransomware-spreading-via-eternalblue-exploit.html |