Skip to content

Forensic Disk Image

Latest
Compare
Choose a tag to compare
@chrisdoman chrisdoman released this 03 Jul 15:24
· 10 commits to main since this release

A forensic DD image of a Windows Server compromised with REvil
The SHA256 of the malware is d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
It is in .gz format, split into a number of ZIP files- use something such as 7ZIP to open.

We manually deployed this over RDP - when reviewing compromised disks expect to see execution from the Kaseya agent at C:\Program Files (x86)\Kaseya...\AgentMon.exe instead