Skip to content

Latest commit

 

History

History
54 lines (42 loc) · 1.66 KB

netwalker.md

File metadata and controls

54 lines (42 loc) · 1.66 KB
ID X0037
Type Ransomware
Aliases None
Platforms Windows
Year 2020
Associated ATT&CK Software Netwalker

Netwalker

Fileless ransomware written in PowerShell and executed directly in memory.

ATT&CK Techniques

See ATT&CK: Netwalker - Techniques Used.

Enhanced ATT&CK Techniques

Name Use
Execution::Command and Scripting Interpreter (E1059) Netwalker is written and executed in Powershell. [1]
Defense Evasion::Obfuscated Files or Information (E1027) Netwalker is obfuscated with several layers of encoding, obfuscation, and encryption techniques such as Base64, hexademcimal, and XOR. [1]
Defense Evasion::Process Injection::Dynamic-link Library Injection (E1055.001) Netwalker uses reflective DLL loading to inject from memory. [1]
Impact::Data Encrypted for Impact (E1486) Netwalker encrypts files for ransom. [1]

Indicators of Compromise

SHA256 Hashes

  • f4656a9af30e98ed2103194f798fa00fd1686618e3e62fba6b15c9959135b7be

References

[1] https://www.trendmicro.com/en_us/research/20/e/netwalker-fileless-ransomware-injected-via-reflective-loading.html