Source: 18.3.Pna3t7DeL3.exe.4940000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 18.3.Pna3t7DeL3.exe.4940000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 18.3.Pna3t7DeL3.exe.4940000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 18.3.Pna3t7DeL3.exe.4940000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 34.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 18.3.Pna3t7DeL3.exe.4940000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 18.3.Pna3t7DeL3.exe.4940000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 18.3.Pna3t7DeL3.exe.4940000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 18.3.Pna3t7DeL3.exe.4940000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 10.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.4910e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 18.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 10.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 18.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 26.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 34.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 34.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 10.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 26.3.Pna3t7DeL3.exe.49c0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0.3.Pna3t7DeL3.exe.49b0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 10.2.Pna3t7DeL3.exe.48c0e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 18.2.Pna3t7DeL3.exe.4840e67.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 34.3.Pna3t7DeL3.exe.4a10000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 26.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 26.2.Pna3t7DeL3.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.unpack, type: UNPACKEDPE | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.unpack, type: UNPACKEDPE | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0.2.Pna3t7DeL3.exe.48b0e67.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000012.00000002.351105527.0000000002C1C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 0000000A.00000002.330612625.0000000002E2C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 0000001A.00000002.349816093.0000000002CCC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000000.00000002.520342340.0000000002E46000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000012.00000003.328749444.0000000004940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000012.00000003.328749444.0000000004940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000012.00000003.328749444.0000000004940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000012.00000003.328749444.0000000004940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000022.00000002.371381797.0000000002C0C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000022.00000003.369188083.0000000004A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000022.00000003.369188083.0000000004A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 00000022.00000003.369188083.0000000004A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000022.00000003.369188083.0000000004A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000022.00000003.369188083.0000000004A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000022.00000002.372121153.0000000004910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000022.00000002.372121153.0000000004910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000022.00000002.372121153.0000000004910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000022.00000002.372121153.0000000004910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 0000000A.00000003.306641155.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0000000A.00000003.306641155.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0000000A.00000003.306641155.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000A.00000003.306641155.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0000000A.00000003.306641155.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0000001A.00000003.345995509.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0000001A.00000003.345995509.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0000001A.00000003.345995509.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000001A.00000003.345995509.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0000001A.00000003.345995509.00000000049C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0000001A.00000002.347999899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0000001A.00000002.347999899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0000001A.00000002.347999899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000001A.00000002.347999899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0000001A.00000002.347999899.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000000.00000002.514046466.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000000.00000002.514046466.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 00000000.00000002.514046466.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000002.514046466.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000000.00000002.514046466.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0000000A.00000002.329058064.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0000000A.00000002.329058064.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 0000000A.00000002.329058064.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 0000000A.00000002.329058064.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0000000A.00000002.329058064.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000022.00000002.370637475.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000022.00000002.370637475.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 00000022.00000002.370637475.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000022.00000002.370637475.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000022.00000002.370637475.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0000001A.00000002.350329472.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0000001A.00000002.350329472.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0000001A.00000002.350329472.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0000001A.00000002.350329472.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 0000000A.00000002.332682795.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 0000000A.00000002.332682795.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 0000000A.00000002.332682795.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 0000000A.00000002.332682795.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000000.00000003.259381395.00000000049B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000000.00000003.259381395.00000000049B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 00000000.00000003.259381395.00000000049B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000000.00000003.259381395.00000000049B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000000.00000003.259381395.00000000049B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000012.00000002.353255484.0000000004840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000012.00000002.353255484.0000000004840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000012.00000002.353255484.0000000004840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000012.00000002.353255484.0000000004840000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: 00000012.00000002.350029244.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000012.00000002.350029244.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth (Nextron Systems), description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16 |
Source: 00000012.00000002.350029244.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000012.00000002.350029244.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000012.00000002.350029244.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000000.00000002.523259180.00000000048B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_EXE_LockBit_v2 date = 2023-01-01, author = Silas Cutler, modified by Florian Roth, description = Detection for LockBit version 2.x from 2011, score = 00260c390ffab5734208a7199df0e4229a76261c3f5b7264c4515acb8eb9c2f8, version = 1.0, modified = 2023-01-06, DaysofYARA = 1/100 |
Source: 00000000.00000002.523259180.00000000048B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_89e64044 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = ec45013d3ecbc39ffce5ac18d5bf8b0d18bcadd66659975b0a9f26bcae0a5b49, id = 89e64044-74e4-4679-b6ad-bfb9b264330c, last_modified = 2021-10-04 |
Source: 00000000.00000002.523259180.00000000048B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Ransomware_Lockbit_a1c60939 reference_sample = 0d6524b9a1d709ecd9f19f75fa78d94096e039b3d4592d13e8dbddf99867182d, os = windows, severity = x86, creation_date = 2021-08-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Lockbit, fingerprint = a41fb21e82ee893468393428d655b03ce251d23f34acb54bbf01ae0eb86817bf, id = a1c60939-e257-420d-87ed-f31f30f2fc2a, last_modified = 2021-10-04 |
Source: 00000000.00000002.523259180.00000000048B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |