{ "0": [ { "SamplePcap": "samplesPcap_compress/Crysis_19112018.pcap.gz", "Binary": "binariosRansomware/Crysis_19112018.exe", "Hash": "2320470fb6b6d14d1a63c652c2135f20", "Family": "Crysis", "TxtSize": "119", "PCAPSize": "1175", "SampleTxt": "samplesTxt_compress/Crysis_19112018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/bf20b92755cd5c2542cdcef804ee795932cc4b0e070ca6b81ff8fd30908a8f97?environmentId=100", "Scenario": "original", "Date": "19/11/2018" } ], "1": [ { "SamplePcap": "samplesPcap_compress/Zeus_31102017.pcap.gz", "Binary": "binariosRansomware/Zeus_31102017.exe", "SampleTxt": "samplesTxt_compress/Zeus_31102017.txt.gz", "Hash": "aa976dd25d299d74ee4128f09469b902", "Family": "Zeus", "Date": "31/10/2017", "Link": "https://www.hybrid-analysis.com/sample/fd922a85483a3abae79203ac96c6f2926a5f1f62f93c009742b64fc3cb669320?environmentId=120", "TxtSize": "2736", "Scenario": "original", "PCAPSize": "2331" } ], "2": [ { "SamplePcap": "samplesPcap_compress/cerber_11122016.pcap.gz", "Binary": "binariosRansomware/cerber_11122016.exe", "Hash": "b53a2061750f723b1ef0e35ee2973843", "Family": "Cerber", "TxtSize": "123", "PCAPSize": "1600", "SampleTxt": "samplesTxt_compress/cerber_11122016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/12/11/index.html", "Scenario": "NAT", "Date": "11/12/2016" } ], "3": [ { "SamplePcap": "samplesPcap_compress/CTBLocker_27012017.pcap.gz", "Binary": "binariosRansomware/CTBLocker_27012017.exe", "Hash": "be62854618491cb4fe30b2299102bb1b", "Family": "CTB-Locker", "TxtSize": "3207", "PCAPSize": "5400", "SampleTxt": "samplesTxt_compress/CTBLocker_27012017.txt.gz", "Scenario": "original", "Link": "https://www.hybrid-analysis.com/sample/4b747f699cdab219152094dd541ebcb6da7e47bbcc8fb33b226b0013d4c7d7f2?environmentId=100", "Date": "27/01/2017" } ], "4": [ { "SamplePcap": "samplesPcap_compress/Locky_03052016.pcap.gz", "Binary": "binariosRansomware/Locky_03052016.exe", "Hash": "1bd1853931b3bcafb268493202a90c29", "Family": "Locky", "PCAPSize": "5381", "TxtSize": "4135", "SampleTxt": "samplesTxt_compress/Locky_03052016.txt.gz", "Scenario": "original", "Link": "https://www.malware-traffic-analysis.net/2016/05/03/index.html", "Date": "03/05/2016" } ], "5": [ { "SamplePcap": "samplesPcap_compress/Sage_23012018.pcap.gz", "Binary": "binariosRansomware/Sage_23012018.exe", "Hash": "0bfd22cccdbf9f024feb1c1fd44e961f", "Family": "Sage", "TxtSize": "39", "PCAPSize": "4586", "Scenario": "original", "SampleTxt": "samplesTxt_compress/Sage_23012018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/136246bed689bff7ab26d7174ffd925d53e4bf831c662282f176d24c099e888a?environmentId=100", "Date": "23/01/2018" } ], "6": [ { "SamplePcap": "samplesPcap_compress/CryptoShield_28022017.pcap.gz", "Binary": "binariosRansomware/CryptoShield_28022017.exe", "Hash": "e4d7596676b884563d9af2eef3642b1f", "Family": "CryptoShield", "TxtSize": "3883", "PCAPSize": "4141", "SampleTxt": "samplesTxt_compress/CryptoShield_28022017.txt.gz", "Scenario": "original", "Link": "https://www.malware-traffic-analysis.net/2017/02/28/index.html", "Date": "28/02/2017" } ], "7": [ { "SamplePcap": "samplesPcap_compress/cerber_22122016.pcap.gz", "Binary": "binariosRansomware/cerber_22122016.exe", "Hash": "21a6db03b58e719920109cd1ba0f6dd8", "Family": "Cerber", "TxtSize": "2200", "PCAPSize": "2000", "SampleTxt": "samplesTxt_compress/cerber_22122016.txt.gz", "Scenario": "NAT", "Link": "https://www.malware-traffic-analysis.net/2016/12/22/index.html", "Date": "22/12/2016" } ], "8": [ { "SamplePcap": "samplesPcap_compress/cerber_07112016.pcap.gz", "Binary": "binariosRansomware/cerber_07112016.exe", "Hash": "0622a02669cffd432c55089e16eac512", "Family": "Cerber", "TxtSize": "1500", "PCAPSize": "923", "SampleTxt": "samplesTxt_compress/cerber_07112016.txt.gz", "Scenario": "NAT", "Link": "https://www.malware-traffic-analysis.net/2016/11/07/index.html", "Date": "07/11/2016" } ], "9": [ { "SamplePcap": "samplesPcap_compress/cerber_03102016.pcap.gz", "Binary": "binariosRansomware/cerber_03102016.exe", "Hash": "b17ff50e5abca3e850a433af42107314", "Family": "Cerber", "TxtSize": "1300", "PCAPSize": "775", "SampleTxt": "samplesTxt_compress/cerber_03102016.txt.gz", "Scenario": "NAT", "Link": "https://www.malware-traffic-analysis.net/2016/10/03/index2.html", "Date": "03/10/2016" } ], "10": [ { "SamplePcap": "samplesPcap_compress/wannaCry_16052017.pcap.gz", "Binary": "binariosRansomware/wannaCry_16052017.exe", "Hash": "84c82835a5d21bbcf75a61706d8ab549", "Scenario": "NAT", "Family": "WannaCry", "TxtSize": "12498", "PCAPSize": "5612", "SampleTxt": "samplesTxt_compress/wannaCry_16052017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa/?environmentId=100", "Date": "16/05/2017" } ], "11": [ { "SamplePcap": "samplesPcap_compress/GlobeImposter_06052017.pcap.gz", "Binary": "binariosRansomware/GlobeImposter_06052017.exe", "Scenario": "NAT", "Hash": "64ae280f3842a83d4ed3ac35bd51c391", "Family": "GlobeImposter", "TxtSize": "18069", "PCAPSize": "2497", "SampleTxt": "samplesTxt_compress/GlobeImposter_06052017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/0edc1cf02ce8889de673d15d3809e6fab7f8e43838bea6a6ec524f493f00ce1e?environmentId=100", "Date": "06/05/2017" } ], "12": [ { "SamplePcap": "samplesPcap_compress/cerber_05102016.pcap.gz", "Binary": "binariosRansomware/cerber_05102016.exe", "Scenario": "NAT", "Hash": "b423c1eaca3ca58738389804763117e6", "Family": "Cerber", "TxtSize": "2500", "PCAPSize": "1600", "SampleTxt": "samplesTxt_compress/cerber_05102016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/10/05/index2.html", "Date": "05/10/2016" } ], "13": [ { "SamplePcap": "samplesPcap_compress/cerber_28112016.pcap.gz", "Binary": "binariosRansomware/cerber_28112016.exe", "Scenario": "NAT", "Hash": "6ca6ee2f76c57a973675a32e3dc2bea6", "Family": "Cerber", "TxtSize": "1300", "PCAPSize": "798", "SampleTxt": "samplesTxt_compress/cerber_28112016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/11/28/index2.html", "Date": "28/11/2016" } ], "14": [ { "SamplePcap": "samplesPcap_compress/Cryxox_27122018.pcap.gz", "Binary": "binariosRansomware/Cryxox_27122018.exe", "Scenario": "original", "Hash": "7cc1402c8d3b33f91da147597ed4dd47", "Family": "Crysis", "TxtSize": "3112", "PCAPSize": "1948", "SampleTxt": "samplesTxt_compress/Cryxox_27122018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/e75ee5dcc9921d016f9d33989cfebe97db006354699f7d005d82801a3daa8920?environmentId=100", "Date": "27/12/2018" } ], "15": [ { "SamplePcap": "samplesPcap_compress/Spora_17052017.pcap.gz", "Binary": "binariosRansomware/Spora_17052017.exe", "Scenario": "NAT", "Hash": "685c6834f8f81948822762cd13a48604", "Family": "Spora", "TxtSize": "1606", "PCAPSize": "465", "SampleTxt": "samplesTxt_compress/Spora_17052017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/05/17/index.html", "Date": "17/05/2017" } ], "16": [ { "SamplePcap": "samplesPcap_compress/CryptoFortress_12032015.pcap.gz", "Binary": "binariosRansomware/CryptoFortress_12032015.exe", "Scenario": "NAT", "Hash": "e6dda3e06fd32fc3670d13098f3e22c9", "Family": "CryptoFortress", "TxtSize": "132", "PCAPSize": "188", "SampleTxt": "samplesTxt_compress/CryptoFortress_12032015.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/2b1f36a4c856b989a941f454fcce3a5e9670b21de105c5014450cbdaa27ed1cb?environmentId=4", "Date": "12/03/2015" } ], "17": [ { "SamplePcap": "samplesPcap_compress/cerber_31102016.pcap.gz", "Binary": "binariosRansomware/cerber_31102016.exe", "Scenario": "NAT", "Hash": "ef914118b3a6e09bb0832204d7296829", "Family": "Cerber", "TxtSize": "1300", "PCAPSize": "770", "SampleTxt": "samplesTxt_compress/cerber_31102016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/10/31/index3.html", "Date": "31/10/2016" } ], "18": [ { "SamplePcap": "samplesPcap_compress/wannaCry_15052017.pcap.gz", "Binary": "binariosRansomware/wannaCry_15052017.exe", "Scenario": "original", "Hash": "db349b97c37d22f5ea1d1841e3c89eb4", "Family": "WannaCry", "TxtSize": "6347", "PCAPSize": "5361", "SampleTxt": "samplesTxt_compress/wannaCry_15052017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c?environmentId=100", "Date": "15/05/2017" } ], "19": [ { "SamplePcap": "samplesPcap_compress/Locky_18082016.pcap.gz", "Binary": "binariosRansomware/Locky_18082016.exe", "Hash": "8c3a6828ae5115978daef9f7fd08fb34", "Scenario": "NAT", "Family": "Locky", "TxtSize": "4300", "PCAPSize": "4700", "SampleTxt": "samplesTxt_compress/Locky_18082016.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/64138ac3670ea7d3adacb5d3b90a473065fd5fad5d348a037b89640a00230208?environmentId=100", "Date": "18/08/2016" } ], "20": [ { "SamplePcap": "samplesPcap_compress/GandCrab_14042018.pcap.gz", "Binary": "binariosRansomware/GandCrab_14042018.exe", "Scenario": "original", "Hash": "bb82802f392e47caaeb67a6a7ff36313", "Family": "GandCrab", "TxtSize": "7186", "PCAPSize": "7832", "SampleTxt": "samplesTxt_compress/GandCrab_14042018.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2018/04/14/index.html", "Date": "14/04/2018" } ], "21": [ { "SamplePcap": "samplesPcap_compress/CryptoMix_28112016.pcap.gz", "Binary": "binariosRansomware/CryptoMix_28112016.exe", "Scenario": "NAT", "Hash": "8c413e31f39a54abf78c3585444051f7", "Family": "CryptoMix", "TxtSize": "891", "PCAPSize": "1100", "SampleTxt": "samplesTxt_compress/CryptoMix_28112016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/11/28/index.html", "Date": "28/11/2016" } ], "22": [ { "SamplePcap": "samplesPcap_compress/cerber_20012017.pcap.gz", "Binary": "binariosRansomware/cerber_20012017.exe", "Scenario": "NAT", "Hash": "7d0c2f75918c5df68fd1edd71e5e8bdf", "Family": "Cerber", "TxtSize": "4175", "PCAPSize": "4258", "SampleTxt": "samplesTxt_compress/cerber_20012017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/01/20/index.html", "Date": "20/01/2017" } ], "23": [ { "SamplePcap": "samplesPcap_compress/CrypMIC_30092016.pcap.gz", "Binary": "binariosRansomware/CrypMIC_30092016.exe", "Scenario": "NAT", "Hash": "370546a376345688e5ad3ef836e2ea78", "Family": "CrypMIC", "TxtSize": "3900", "PCAPSize": "3900", "SampleTxt": "samplesTxt_compress/CrypMIC_30092016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/09/30/index.html", "Date": "30/09/2016" } ], "24": [ { "SamplePcap": "samplesPcap_compress/Jaff_06062017.pcap.gz", "Binary": "binariosRansomware/Jaff_06062017.exe", "Scenario": "NAT", "Hash": "5ca3d8cf1cde038e762b535ec4e905fe", "Family": "Jaff", "TxtSize": "431", "PCAPSize": "492", "SampleTxt": "samplesTxt_compress/Jaff_06062017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/06/06/index2.html", "Date": "06/06/2017" } ], "25": [ { "SamplePcap": "samplesPcap_compress/Virlock_17072016.pcap.gz", "Binary": "binariosRansomware/Virlock_17072016.exe", "Scenario": "NAT", "Hash": "edc0fd0edb8fcdb161aae9d4eef9976a", "Family": "Virlock", "TxtSize": "1260", "PCAPSize": "970", "SampleTxt": "samplesTxt_compress/Virlock_17072016.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/d78dbfa4fef22b024abd42c6ff50090b04be8e8c70a353a3a06ad6185d11637d?environmentId=100", "Date": "17/07/2016" } ], "26": [ { "SamplePcap": "samplesPcap_compress/Diablo6_15082017.pcap.gz", "Binary": "binariosRansomware/Diablo6_15082017.exe", "Scenario": "NAT", "Hash": "50a392bfad46858196490e6e38935d33", "Family": "Locky", "TxtSize": "4143", "PCAPSize": "4918", "SampleTxt": "samplesTxt_compress/Diablo6_15082017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/37932b22c97851ae7b71c7515f32e923ac9e94d337c39333abddbc979d4fcce2?environmentId=100", "Date": "15/08/2017" } ], "27": [ { "SamplePcap": "samplesPcap_compress/GandCrab_22052019.pcap.gz", "Binary": "binariosRansomware/GandCrab_22052019.exe", "Scenario": "NAT", "Hash": "538d23ef01426d1157fa1137471a5cf7", "Family": "GandCrab", "TxtSize": "3101", "PCAPSize": "1943", "SampleTxt": "samplesTxt_compress/GandCrab_22052019.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2019/05/22/index.html", "Date": "22/05/2019" } ], "28": [ { "SamplePcap": "samplesPcap_compress/Jaff_13062017.pcap.gz", "Binary": "binariosRansomware/Jaff_13062017.exe", "Scenario": "NAT", "Hash": "2611ef63084b219fb844528dee7c74c6", "Family": "Jaff", "TxtSize": "2269", "PCAPSize": "954", "SampleTxt": "samplesTxt_compress/Jaff_13062017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/06/13/index.html", "Date": "13/06/2017" } ], "29": [ { "SamplePcap": "samplesPcap_compress/Locky_19072016.pcap.gz", "Binary": "binariosRansomware/Locky_19072016.exe", "Scenario": "NAT", "Hash": "ee1ef763460f073bbc845c245d08288f", "Family": "Locky", "TxtSize": "4900", "PCAPSize": "4700", "SampleTxt": "samplesTxt_compress/Locky_19072016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/07/19/index2.html", "Date": "19/07/2016" } ], "30": [ { "SamplePcap": "samplesPcap_compress/Crysis_17092018.pcap.gz", "Binary": "binariosRansomware/Crysis_17092018.exe", "Hash": "e9d396504c415eb746396ec310eacd1f", "Scenario": "NAT", "Family": "Crysis", "TxtSize": "5100", "PCAPSize": "1169", "SampleTxt": "samplesTxt_compress/Crysis_17092018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/05fd72a70e0604da8e888b1ecbab2e3ca77fe079a2abe06157769e30e22dedcd?environmentId=120", "Date": "17/09/2018" } ], "31": [ { "SamplePcap": "samplesPcap_compress/Aleta_29072017.pcap.gz", "Binary": "binariosRansomware/Aleta_29072017.exe", "Scenario": "NAT", "Hash": "dc6f8298261ac0e16e6aa65f3e53b4d6", "Family": "Aleta", "TxtSize": "9600", "PCAPSize": "2200", "SampleTxt": "samplesTxt_compress/Aleta_29072017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/07/29/index.html", "Date": "29/07/2017" } ], "32": [ { "SamplePcap": "samplesPcap_compress/Ryuk_16042019.pcap.gz", "Binary": "binariosRansomware/Ryuk_16042019.exe", "Scenario": "NAT", "Hash": "31bd0f224e7e74eee2847f43aae23974", "Family": "Ryuk", "TxtSize": "1200", "PCAPSize": "2756", "SampleTxt": "samplesTxt_compress/Ryuk_16042019.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/f130530949c0e3adca48ba558980b634c0a78c8faa5572718b665cc7abfd7703/?environmentId=120", "Date": "16/04/2019" } ], "33": [ { "SamplePcap": "samplesPcap_compress/Crysis_15112018.pcap.gz", "Binary": "binariosRansomware/Crysis_15112018.exe", "Scenario": "NAT", "Hash": "2bbb2d9be1a993a8dfef0dd719c589a0", "Family": "Crysis", "TxtSize": "52", "PCAPSize": "1631", "SampleTxt": "samplesTxt_compress/Crysis_15112018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/bf20b92755cd5c2542cdcef804ee795932cc4b0e070ca6b81ff8fd30908a8f97?environmentId=100", "Date": "15/11/2018" } ], "34": [ { "SamplePcap": "samplesPcap_compress/Odin_27092016.pcap.gz", "Binary": "binariosRansomware/Odin_27092016.exe", "Scenario": "NAT", "Hash": "01f7db952b1b17d0a090b09018896105", "Family": "Locky", "TxtSize": "4400", "PCAPSize": "4700", "SampleTxt": "samplesTxt_compress/Odin_27092016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/09/27/index.html", "Date": "27/09/2016" } ], "35": [ { "SamplePcap": "samplesPcap_compress/Locky_26022016.pcap.gz", "Binary": "binariosRansomware/Locky_26022016.exe", "Scenario": "original", "Hash": "3f118d0b888430ab9f58fc2589207988", "Family": "Locky", "TxtSize": "4480", "PCAPSize": "5449", "SampleTxt": "samplesTxt_compress/Locky_26022016.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/f927efd7cd2da3a052d857632f78ccf04b673e2774f6ce9a075e654dfd77d940?environmentId=1", "Date": "26/02/2016" } ], "36": [ { "SamplePcap": "samplesPcap_compress/revenge_15032018.pcap.gz", "Binary": "binariosRansomware/revenge_15032018.exe", "Scenario": "original", "Hash": "44cbd69325abe190bbe850653494c422", "Family": "Revenge", "TxtSize": "2018", "PCAPSize": "3162", "SampleTxt": "samplesTxt_compress/revenge_15032018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/07e683250373e88b5e1522db19e9f04a586cb71454e13ab7bda7c89630ae3a3e?environmentId=100", "Date": "15/03/2018" } ], "37": [ { "SamplePcap": "samplesPcap_compress/Locky_29082016.pcap.gz", "Binary": "binariosRansomware/Locky_29082016.exe", "Scenario": "NAT", "Hash": "252e5d964f8b69ea6911fb4c38e36906", "Family": "Locky", "TxtSize": "4500", "PCAPSize": "4800", "SampleTxt": "samplesTxt_compress/Locky_29082016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/08/29/index4.html", "Date": "29/08/2016" } ], "38": [ { "SamplePcap": "samplesPcap_compress/cerber_04012017.pcap.gz", "Binary": "binariosRansomware/cerber_04012017.exe", "Scenario": "NAT", "Hash": "1f41be13d5d19e1a5c76b6d7256a8df4", "Family": "Cerber", "TxtSize": "3894", "PCAPSize": "4171", "SampleTxt": "samplesTxt_compress/cerber_04012017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/01/04/index2.html", "Date": "04/01/2017" } ], "39": [ { "SamplePcap": "samplesPcap_compress/maktub_12042018.pcap.gz", "Binary": "binariosRansomware/maktub_12042018.exe", "Scenario": "original", "Hash": "a09953399ffea70b37322642e52b3d28", "Family": "Maktub", "TxtSize": "708", "PCAPSize": "347", "SampleTxt": "samplesTxt_compress/maktub_12042018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/e4e9e8bb028a3774607c6799fb126153f7a5a6f73e5101864d93f0808e392d9c?environmentId=120", "Date": "12/04/2018" } ], "40": [ { "SamplePcap": "samplesPcap_compress/Locky_27042016.pcap.gz", "Binary": "binariosRansomware/Locky_27042016.exe", "Scenario": "original", "Hash": "e3e30cac025947224b302a41e9ca8a40", "Family": "Locky", "TxtSize": "1896", "PCAPSize": "3927", "SampleTxt": "samplesTxt_compress/Locky_27042016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/04/27/index2.html", "Date": "27/04/2016" } ], "41": [ { "SamplePcap": "samplesPcap_compress/Locky_23042016.pcap.gz", "Binary": "binariosRansomware/Locky_23042016.exe", "Scenario": "original", "Hash": "fb6ca1cd232151d667f6cd2484fee8c8", "Family": "Locky", "TxtSize": "4479", "PCAPSize": "5449", "SampleTxt": "samplesTxt_compress/Locky_23042016.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/17c3d74e3c0645edb4b5145335b342d2929c92dff856cca1a5e79fa5d935fec2?environmentId=4", "Date": "23/04/2016" } ], "42": [ { "SamplePcap": "samplesPcap_compress/cerber_12102016.pcap.gz", "Binary": "binariosRansomware/cerber_12102016.exe", "Scenario": "NAT", "Hash": "0e6d96d1236d285b84cda050dddd7e54", "Family": "Cerber", "TxtSize": "1400", "PCAPSize": "845", "SampleTxt": "samplesTxt_compress/cerber_12102016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/10/12/index2.html", "Date": "12/10/2016" } ], "43": [ { "SamplePcap": "samplesPcap_compress/Mole_26052018.pcap.gz", "Binary": "binariosRansomware/Mole_26052018.exe", "Scenario": "original", "Hash": "6657d1452ebe682a01a49b6e4a711bea", "Family": "Mole", "TxtSize": "4424", "PCAPSize": "3902", "SampleTxt": "samplesTxt_compress/Mole_26052018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/9e32f6654a122fbceef5d1b0bd6d781fb364b74aedce94fea8e7969836bcf4f7?environmentId=100", "Date": "26/05/2018" } ], "44": [ { "SamplePcap": "samplesPcap_compress/bart_01092016.pcap.gz", "Binary": "binariosRansomware/bart_01092016.exe", "Scenario": "NAT", "Hash": "4741852c23364619257c705aca9b1be3", "Family": "Bart", "TxtSize": "7800", "PCAPSize": "3500", "SampleTxt": "samplesTxt_compress/bart_01092016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/09/01/index2.html", "Date": "01/09/2016" } ], "45": [ { "SamplePcap": "samplesPcap_compress/cerber_24012017.pcap.gz", "Binary": "binariosRansomware/cerber_24012017.exe", "Scenario": "NAT", "Hash": "67526df5413c58c145bc2e36536ae67f", "Family": "Cerber", "TxtSize": "3502", "PCAPSize": "4139", "SampleTxt": "samplesTxt_compress/cerber_24012017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/01/24/index.html", "Date": "24/01/2017" } ], "46": [ { "SamplePcap": "samplesPcap_compress/Crysis_19122016.pcap.gz", "Binary": "binariosRansomware/Crysis_19122016.exe", "Scenario": "original", "Hash": "ab1118c42718a9b33fb180c58f84cab4", "Family": "Crysis", "TxtSize": "170", "PCAPSize": "1284", "SampleTxt": "samplesTxt_compress/Crysis_19122016.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/d211f2dc1401d4d0939e8a8b990a9f7330d8943a3e4f9459aea9ca3aad5f614d?environmentId=100", "Date": "19/12/2016" } ], "47": [ { "SamplePcap": "samplesPcap_compress/cerber_06022017.pcap.gz", "Binary": "binariosRansomware/cerber_06022017.exe", "Scenario": "NAT", "Hash": "b65f05882c80f469d1deff355e073684", "Family": "Cerber", "TxtSize": "273", "PCAPSize": "9200", "SampleTxt": "samplesTxt_compress/cerber_06022017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/02/06/index4.html", "Date": "06/02/2017" } ], "48": [ { "SamplePcap": "samplesPcap_compress/CryptoMix_13012017.pcap.gz", "Binary": "binariosRansomware/CryptoMix_13012017.exe", "Scenario": "NAT", "Hash": "f48ca69b0c2cdbe69dcfd4b73ae497c4", "Family": "CryptoMix", "TxtSize": "3512", "PCAPSize": "4140", "SampleTxt": "samplesTxt_compress/CryptoMix_13012017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/01/13/index.html", "Date": "13/01/2017" } ], "49": [ { "SamplePcap": "samplesPcap_compress/Virlock_16022017.pcap.gz", "Binary": "binariosRansomware/Virlock_16022017.exe", "Scenario": "NAT", "Hash": "a8f734b1eb48fb15ac70b26fa802a485", "Family": "Virlock", "TxtSize": "1939", "PCAPSize": "2442", "SampleTxt": "samplesTxt_compress/Virlock_16022017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/5008d6522bd0ccf73ae97ca8120dedddd755b8a5190bd6d929da793debe7ec75?environmentId=100", "Date": "16/02/2017" } ], "50": [ { "SamplePcap": "samplesPcap_compress/cerber_04102016.pcap.gz", "Binary": "binariosRansomware/cerber_04102016.exe", "Scenario": "NAT", "Hash": "6094502bad521cce683cf57ab39aeb98", "Family": "Cerber", "TxtSize": "769", "PCAPSize": "457", "SampleTxt": "samplesTxt_compress/cerber_04102016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/10/04/index2.html", "Date": "04/10/2016" } ], "51": [ { "SamplePcap": "samplesPcap_compress/Crysis_18112018.pcap.gz", "Binary": "binariosRansomware/Crysis_18112018.exe", "Scenario": "NAT", "Hash": "d32e4d8b4238cfcc793ec3b37cc9a875", "Family": "Crysis", "TxtSize": "40", "PCAPSize": "1167", "SampleTxt": "samplesTxt_compress/Crysis_18112018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/17b78fc69818c9cd55f67786c9859219adb52a2ef3baf2d781f1b84a05c838fd?environmentId=100", "Date": "18/11/2018" } ], "52": [ { "SamplePcap": "samplesPcap_compress/Virlock_01082017.pcap.gz", "Binary": "binariosRansomware/Virlock_01082017.exe", "Scenario": "original", "Hash": "b1b4e2217285431ecb5979a47e150d22", "Family": "Virlock", "TxtSize": "1641", "PCAPSize": "2015", "SampleTxt": "samplesTxt_compress/Virlock_01082017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/7db4763240f3739d34b6eab7742ae838aeac2a0fb9f0891e8811436e6b69fadf?environmentId=100", "Date": "01/08/2017" } ], "53": [ { "SamplePcap": "samplesPcap_compress/cerber_10082016.pcap.gz", "Binary": "binariosRansomware/cerber_10082016.exe", "Hash": "e8d33b26c99ff3f91211ee21b97bdda1", "Scenario": "original", "Family": "Cerber", "TxtSize": "90", "PCAPSize": "83", "SampleTxt": "samplesTxt_compress/cerber_10082016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/08/10/index.html", "Date": "10/08/2016" } ], "54": [ { "SamplePcap": "samplesPcap_compress/Locky_22092016.pcap.gz", "Binary": "binariosRansomware/Locky_22092016.exe", "Scenario": "NAT", "Hash": "4a03a16b548fe94d487ca15c9e21f87f", "Family": "Locky", "TxtSize": "4400", "PCAPSize": "4700", "SampleTxt": "samplesTxt_compress/Locky_22092016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/09/22/index.html", "Date": "22/09/2016" } ], "55": [ { "SamplePcap": "samplesPcap_compress/CryptoShield_31012017.pcap.gz", "Binary": "binariosRansomware/CryptoShield_31012017.exe", "Hash": "cc882e0f288b8996bfa66cda9a27e137", "Scenario": "original", "Family": "CryptoShield", "TxtSize": "491", "PCAPSize": "157", "SampleTxt": "samplesTxt_compress/CryptoShield_31012017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/01/31/index2.html", "Date": "31/01/2017" } ], "56": [ { "SamplePcap": "samplesPcap_compress/Dharma_01012017.pcap.gz", "Binary": "binariosRansomware/Dharma_01012017.exe", "Scenario": "original", "Hash": "809307c7a15b9930aa9d03e35eb87b10", "Family": "Crysis", "TxtSize": "121", "PCAPSize": "1606", "SampleTxt": "samplesTxt_compress/Dharma_01012017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/37932b22c97851ae7b71c7515f32e923ac9e94d337c39333abddbc979d4fcce2?environmentId=100", "Date": "01/01/2017" } ], "57": [ { "SamplePcap": "samplesPcap_compress/CryptoMix_12122016.pcap.gz", "Binary": "binariosRansomware/CryptoMix_12122016.exe", "Hash": "c2f30cd537c79b6bcd292e6824ea874e", "Scenario": "NAT", "Family": "CryptoMix", "TxtSize": "3400", "PCAPSize": "3900", "SampleTxt": "samplesTxt_compress/CryptoMix_12122016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/12/12/index.html", "Date": "12/12/2016" } ], "58": [ { "SamplePcap": "samplesPcap_compress/MRCR_15012017.pcap.gz", "Binary": "binariosRansomware/MRCR_15012017.exe", "Hash": "148150db1170b5698243c8b018071843", "Scenario": "original", "Family": "MRCR", "TxtSize": "4067", "PCAPSize": "263", "SampleTxt": "samplesTxt_compress/MRCR_15012017.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/61091d583492a0d0f0d027a9bc13b054fbf5ba0b997c3dc82b9b18da6c551765?environmentId=120", "Date": "15/01/2017" } ], "59": [ { "SamplePcap": "samplesPcap_compress/Sage_10052018.pcap.gz", "Binary": "binariosRansomware/Sage_10052018.exe", "Scenario": "original", "Hash": "05b7e80b215578e2c737549925daef10", "Family": "Sage", "TxtSize": "558", "PCAPSize": "8544", "SampleTxt": "samplesTxt_compress/Sage_10052018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/052b509cce1ce84abc2be8ac481e847470fc2cee8da98a2dd84a3b0bc85ca06f?environmentId=100", "Date": "10/05/2018" } ], "60": [ { "SamplePcap": "samplesPcap_compress/CryptFile2_10112016.pcap.gz", "Binary": "binariosRansomware/CryptFile2_10112016.exe", "Hash": "f27519b964ba21ca09a4fe64917cc375", "Family": "CryptFile2", "Scenario": "NAT", "TxtSize": "3500", "PCAPSize": "3900", "SampleTxt": "samplesTxt_compress/CryptFile2_10112016.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2016/11/10/index3.html", "Date": "10/11/2016" } ], "61": [ { "SamplePcap": "samplesPcap_compress/Crysis_12042018.pcap.gz", "Binary": "binariosRansomware/Crysis_12042018.exe", "Scenario": "NAT", "Hash": "64310a2f895b55a32fbe5ec86f90d090", "Family": "Crysis", "TxtSize": "83", "PCAPSize": "3174", "SampleTxt": "samplesTxt_compress/Crysis_12042018.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/d62840dc0ba37874da5a25a7cad8eebecd0d503ef650c8b4f4caf674a4bb53a3?environmentId=100", "Date": "12/04/2018" } ], "62": [ { "SamplePcap": "samplesPcap_compress/DMALocker_01022016.pcap.gz", "Scenario": "original", "Binary": "binariosRansomware/DMALocker_01022016.exe", "Hash": "6fbd3cdcafd6695c384a1119873786aa", "Family": "DMALocker", "TxtSize": "7464", "PCAPSize": "821", "SampleTxt": "samplesTxt_compress/DMALocker_01022016.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/db1696106bb100a1fc10fadc9b93e17f80055604fa53fe3785b64efdabe0a254?environmentId=4", "Date": "01/02/2016" } ], "63": [ { "SamplePcap": "samplesPcap_compress/CryptoMix_24012017.pcap.gz", "Binary": "binariosRansomware/CryptoMix_24012017.exe", "Scenario": "NAT", "Hash": "67ebcd5c61905474441aeaadfe9575bb", "Family": "CryptoMix", "TxtSize": "108", "PCAPSize": "8300", "SampleTxt": "samplesTxt_compress/CryptoMix_24012017.txt.gz", "Link": "https://www.malware-traffic-analysis.net/2017/01/24/index2.html", "Date": "24/01/2017" } ], "64": [ { "Date": "02/08/2019", "Family": "Eris", "Hash": "a4eeec442799c56c3e1aa9761661fb42", "Binary": "binariosRansomware/Eris_02082019.exe", "Scenario": "NAT", "TxtSize": "4063", "PCAPSize": "2986", "Link": "https://www.malware-traffic-analysis.net/2019/08/02/index.html", "SampleTxt": "samplesTxt_compress/Eris_02082019.txt.gz", "SamplePcap": "samplesPcap_compress/Eris_02082019.pcap.gz" } ], "65": [ { "Date": "10/02/2019", "Family": "STOP", "Hash": "febce80af00ffa5c1e6d9d3e1d5278ee", "Binary": "binariosRansomware/Stop_10022019.exe", "Scenario": "NAT", "TxtSize": "5251", "PCAPSize": "3963", "Link": "https://www.hybrid-analysis.com/sample/23da0dda0b6eb3dd9854e4f78a58d6a9248118962119c106171461e60cf4f5cf?environmentId=100", "SampleTxt": "samplesTxt_compress/Stop_10022019.txt.gz", "SamplePcap": "samplesPcap_compress/Stop_10022019.pcap.gz" } ], "66": [ { "Date": "30/08/2017", "Family": "BitPaymer", "Hash": "0a19dd8fdd632f175f0ff0488e4cd8f2", "Binary": "binariosRansomware/bitPaymer_30082017.exe", "Scenario": "NAT", "TxtSize": "7741", "Link": "https://www.hybrid-analysis.com/sample/1c0ffdaddec1eca9a9a5ef5192151dbce8ccd8e31a84c51d70f5a5c64f07a363?environmentId=100", "SampleTxt": "samplesTxt_compress/bitPaymer_30082017.txt.gz", "SamplePcap": "samplesPcap_compress/bitPaymer_30082017.pcap.gz", "PCAPSize": "6050" } ], "67": [ { "Date": "28/12/2015", "Family": "TeslaCrypt", "Hash": "14c18ac91a84a129a2140c5833c298db", "Binary": "binariosRansomware/TeslaCrypt_28122015.exe", "Scenario": "original", "TxtSize": "3068", "Link": "https://www.hybrid-analysis.com/sample/f87a18bdc206718fdbe39fca64870066658bb1341558012197f5f337ec311da4?environmentId=1", "SampleTxt": "samplesTxt_compress/TeslaCrypt_28122015.txt.gz", "SamplePcap": "samplesPcap_compress/TeslaCrypt_28122015.pcap.gz", "PCAPSize": "3457" } ], "68": [ { "Date": "08/05/2019", "Family": "Phobos", "Hash": "62d3580c88222c59a276a2df8445758c", "Binary": "binariosRansomware/Phobos_08052019.exe", "Scenario": "NAT", "TxtSize": "68000", "Link": "https://www.hybrid-analysis.com/sample/3bbac55728d38c1bcaac6b6fece73fb7a66ac3a0a71093bcacd4577c351db989?environmentId=100", "SampleTxt": "samplesTxt_compress/Phobos_08052019.txt.gz", "SamplePcap": "samplesPcap_compress/Phobos_08052019.pcap.gz", "PCAPSize": "2800" } ], "69": [ { "Date": "10/04/2019", "Family": "Sodinokibi", "Hash": "61c19e7ce627da9b5004371f867a47d3", "Binary": "binariosRansomware/sodinokibi_19072019.exe", "Scenario": "NAT", "TxtSize": "20000", "Link": "https://www.hybrid-analysis.com/sample/bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9?environmentId=120", "SampleTxt": "samplesTxt_compress/Sodinokibi_19072019.txt.gz", "SamplePcap": "samplesPcap_compress/Sodinokibi_19072019.pcap.gz", "PCAPSize": "1400" } ], "70": [ { "Date": "01/02/2020", "Family": "STOP", "Hash": "283bf952e656763a94626cac01d7bc85", "Binary": "binariosRansomware/stop_01022020.exe", "Scenario": "NAT", "TxtSize": "18000", "Link": "https://www.hybrid-analysis.com/sample/a4b51921f0a43dfc147a9c69f5ac5d6abb6420126a7ba54c97d119697f560ecc?environmentId=100", "SampleTxt": "samplesTxt_compress/Stop_01022020.txt.gz", "SamplePcap": "samplesPcap_compress/Stop_01022020.pcap.gz", "PCAPSize": "804" } ], "71": [ { "Date": "23/03/2020", "Family": "Sodinokibi", "Hash": "61c19e7ce627da9b5004371f867a47d3", "Binary": "binariosRansomware/sodinokibi_19072019.exe", "Scenario": "NAT", "TxtSize": "1900", "Link": "https://www.hybrid-analysis.com/sample/6f4da4d2ffa8f6d304131abe904252b8525f41869995eda3a8053de5ba550b27?environmentId=100", "SampleTxt": "samplesTxt_compress/Sodinokibi_23032020.txt.gz", "SamplePcap": "samplesPcap_compress/Sodinokibi_23032020.pcap.gz", "PCAPSize": "1200" } ], "72": [ { "Date": "24/03/2020", "Family": "Sodinokibi", "Hash": "5256618e96a84f077e60fd6ee39a4eca", "Binary": "binariosRansomware/Sodinokibi_24032020.exe", "Scenario": "NAT", "TxtSize": "4400", "Link": "https://www.hybrid-analysis.com/sample/bde4045f53bfb7b933569664c1fad76e1f510099a8bb76d36e4139d55a2bd45d?environmentId=120", "SampleTxt": "samplesTxt_compress/Sodinokibi_24032020.txt.gz", "SamplePcap": "samplesPcap_compress/Sodinokibi_24032020.pcap.gz", "PCAPSize": "5500" } ], "73": [ { "Date": "18/06/2020", "Family": "Crysis", "Hash": "d8b506b604daf44858f635c9496d0e59", "Binary": "binariosRansomware/Dharma_18062020.exe", "Scenario": "NAT", "TxtSize": "4200", "Link": "https://www.hybrid-analysis.com/sample/0f535af00bfe779092695a9b52daf1116da981b54d7ee4aefe702c5b662ba140?environmentId=120", "SampleTxt": "samplesTxt_compress/Dharma_18062020.txt.gz", "SamplePcap": "samplesPcap_compress/Dharma_18062020.pcap.gz", "PCAPSize": "1300" } ], "74": [ { "Date": "19/12/2019", "Family": "Maze", "Hash": "e69a8eb94f65480980deaf1ff5a431a6", "Binary": "binariosRansomware/Maze_19122019.exe", "Scenario": "NAT", "TxtSize": "4800", "Link": "https://www.hybrid-analysis.com/sample/fc611f9d09f645f31c4a77a27b6e6b1aec74db916d0712bef5bce052d12c971f?environmentId=100", "SampleTxt": "samplesTxt_compress/Maze_19122019.txt.gz", "SamplePcap": "samplesPcap_compress/Maze_19122019.pcap.gz", "PCAPSize": "5000" } ], "75": [ { "Date": "18/10/2019", "Family": "Scarab", "Hash": "33ff49640f83e5a33fd5e61c5cec6f47", "Binary": "binariosRansomware/Scarab_18102019.exe", "Scenario": "NAT", "TxtSize": "5600", "Link": "https://www.hybrid-analysis.com/sample/d750099606fe799902b7e5cf28f25446e85090510ea3e4a05793cb379f8e9621/5da94bfa217d93849fe67d6e", "SampleTxt": "samplesTxt_compress/Scarab_18102019.txt.gz", "SamplePcap": "samplesPcap_compress/Scarab_18102019.pcap.gz", "PCAPSize": "215" } ], "76": [ { "Date": "28/06/2020", "Family": "RansomX", "Hash": "fcd21c6fca3b9378961aa1865bee7ecb", "Binary": "binariosRansomware/RansomX_28062020.exe", "Scenario": "NAT", "TxtSize": "2700", "Link": "https://www.hybrid-analysis.com/sample/4cae449450c07b7aa74314173c7b00d409eabfe22b86859f3b3acedd66010458/5ef8c94e41a80103a733e72e", "SampleTxt": "samplesTxt_compress/RansomX_28062020.txt.gz", "SamplePcap": "samplesPcap_compress/RansomX_28062020.pcap.gz", "PCAPSize": "212" } ], "77": [ { "SamplePcap": "samplesPcap_compress/Shaofao_20082020.pcap.gz", "Binary": "binariosRansomware/Shaofao_20082020.exe", "Scenario": "NAT", "Hash": "a822d8ae2979a58e3da4132822169cff", "Family": "Crysis", "TxtSize": "4200", "PCAPSize": "1300", "SampleTxt": "samplesTxt_compress/Shaofao_20082020.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/1ea46702e232b2a60d168a93d42053ed9043bf98fe4a2b5a8057c73e0ee3e3c4/5f3e85efaecaec176b4ff152", "Date": "20/08/2020" } ], "78": [ { "SamplePcap": "samplesPcap_compress/Dharma_23082020.pcap.gz", "Binary": "binariosRansomware/Dharma_23082020.exe", "Scenario": "NAT", "Hash": "cd28f7461f4796a94d0bdd0c6626a5c9", "Family": "Crysis", "TxtSize": "4000", "PCAPSize": "24", "SampleTxt": "samplesTxt_compress/Dharma_23082020.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/9757387fe179cfff459275a5f0c88d75ec5426480c09184db2d3e286ffed7c78/5f41b878b4f43f0f6a636e1c", "Date": "23/08/2020" } ], "79": [ { "SamplePcap": "samplesPcap_compress/Shade_15112019.pcap.gz", "Binary": "binariosRansomware/Shade_15112019.exe", "Scenario": "NAT", "Hash": "42405f6b31fd7fb68d3ea38c0ac46885", "Family": "Shade", "TxtSize": "2600", "PCAPSize": "2600", "SampleTxt": "samplesTxt_compress/Shade_15112019.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/9b640e6f761770712c369f9fd636a0f1c031b48204958caec5971f9a2bbe39e7/5dcbb201038838d71ba7cd44", "Date": "15/11/2019" } ], "80": [ { "SamplePcap": "samplesPcap_compress/Razi_15012021.pcap.gz", "Binary": "binariosRansomware/Razi_15012021.exe", "Scenario": "NAT", "Hash": "e25e078255b56b47897ac96a7842de92", "Family": "Razi", "TxtSize": "3400", "PCAPSize": "3700", "SampleTxt": "samplesTxt_compress/Razi_15012021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/1b9412ca5e9deb29aeaa37be05ae8d0a8a636c12fdff8c17032aa017f6075c02/60014663afa20b6961295e5f", "Date": "15/01/2021" } ], "81": [ { "SamplePcap": "samplesPcap_compress/Ryuk_10012021.pcap.gz", "Binary": "binariosRansomware/Ryuk_10012021.exe", "Scenario": "NAT", "Hash": "8555b213260ba5eda4bf37652cecb431", "Family": "Ryuk", "TxtSize": "2500", "PCAPSize": "3700", "SampleTxt": "samplesTxt_compress/Ryuk_10012021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/781bc4dcbd459893397a8b987bf697f5b95435dfaf7fe3f4d2224728e7a2202a/5ffb90ccb9847d25941e91bf", "Date": "10/01/2021" } ], "82": [ { "SamplePcap": "samplesPcap_compress/Sodinokibi_23012021.pcap.gz", "Binary": "binariosRansomware/Sodinokibi_23012021.exe", "Scenario": "NAT", "Hash": "c4eeb2e764bae1439b6c4aa6b2606090", "Family": "Sodinokibi", "TxtSize": "8200", "PCAPSize": "2500", "SampleTxt": "samplesTxt_compress/Sodinokibi_23012021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/1eb4df21d3ca977bbee0f7a87b5569235a517e3577d31a9e796c630796994864/600d58e5091bd148cc16623b", "Date": "23/01/2021" } ], "83": [ { "SamplePcap": "samplesPcap_compress/CryLock_24012021.pcap.gz", "Binary": "binariosRansomware/CryLock_24012021.exe", "Scenario": "NAT", "Hash": "b961eb350e94cead67efae131b3fff4c", "Family": "CryLock", "TxtSize": "3200", "PCAPSize": "578", "SampleTxt": "samplesTxt_compress/CryLock_24012021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/79a3ed67bbd02fdc01c1d3b11d343cf93217c9d85d6ca9dd4d275114a97435ea/600d37770bbe1c47914c931d", "Date": "24/01/2021" } ], "84": [ { "SamplePcap": "samplesPcap_compress/cerber_25062021.pcap.gz", "Binary": "binariosRansomware/cerber_25062021.exe", "Scenario": "NAT", "Hash": "d596bec4e3cb526f786d68a0fbbf77b5", "Family": "Cerber", "TxtSize": "1130", "PCAPSize": "4381", "SampleTxt": "samplesTxt_compress/cerber_25062021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/b6aed3ae2f4d29839b3fd7b909d6a31f188bb9a6daecf1ba300de81ce94dd65b/60c8f84f1da735067d77ba44", "Date": "25/06/2021" } ], "85": [ { "SamplePcap": "samplesPcap_compress/Dharma_23062021.pcap.gz", "Binary": "binariosRansomware/Dharma_23062021.exe", "Scenario": "NAT", "Hash": "4bec9c3bc8fceb9672173bb33f84a8d1", "Family": "Crysis", "TxtSize": "2928.68", "PCAPSize": "1051.59", "SampleTxt": "samplesTxt_compress/Dharma_23062021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/9459d3fff78ad0b57464dff56a096d1c8c4de55c7e75f7d548869d7bc2cbd90e/60d33b8d073cfe24b47c42be", "Date": "23/06/2021" } ], "86": [ { "SamplePcap": "samplesPcap_compress/netwalker_21012021.pcap.gz", "Binary": "binariosRansomware/netwalker_21012021.exe", "Scenario": "NAT", "Hash": "3229e2489dde524195cf0ccbbf5f7d40", "Family": "Netwalker", "TxtSize": "4628.61", "PCAPSize": "169.704", "SampleTxt": "samplesTxt_compress/netwalker_21012021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/488261e1e0793e6830f68c572db7e229af1d9403bbc8e61b9da707b1b63a137d/6009fdfc258f0177cd739c6e", "Date": "21/01/2021" } ], "87": [ { "SamplePcap": "samplesPcap_compress/Sodinokibi_27042021.pcap.gz", "Binary": "binariosRansomware/Sodinokibi_27042021.exe", "Scenario": "NAT", "Hash": "cfff09d3936962f72fcee2a50e3fc2c4", "Family": "Sodinokibi", "TxtSize": "7118.09", "PCAPSize": "4836.87", "SampleTxt": "samplesTxt_compress/Sodinokibi_27042021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/54f07b825fd662618e1142ee47ef5c988c08ae59c60209bef250fc68bfd3826c/60877114083c8d0f5d131944", "Date": "27/04/2021" } ], "88": [ { "SamplePcap": "samplesPcap_compress/Sodinokibi_04052021.pcap.gz", "Binary": "binariosRansomware/Sodinokibi_04052021.exe", "Scenario": "NAT", "Hash": "cfff09d3936962f72fcee2a50e3fc2c4", "Family": "Sodinokibi", "TxtSize": "23000", "PCAPSize": "1200", "SampleTxt": "samplesTxt_compress/Sodinokibi_04052021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/939f58c10211a768f664a8f54310dcc42eb672887be61d5d377b5a88be107b9d/609150bb2c3d501170673fcd", "Date": "04/05/2021" } ], "89": [ { "SamplePcap": "samplesPcap_compress/wannaCry_24062021.pcap.gz", "Binary": "binariosRansomware/wannaCry_24062021.exe", "Scenario": "NAT", "Hash": "8ca0780db84fa71fee7a6a3dec66fd57", "Family": "WannaCry", "TxtSize": "3000", "PCAPSize": "4800", "SampleTxt": "samplesTxt_compress/wannaCry_24062021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/db28ec41adb0407d75fd2e95cfbfee2ab8053700a78933e5091b7bc1741feea4/60d5093b2d4c1d35fb5d889d", "Date": "04/05/2021" } ], "90": [ { "SamplePcap": "samplesPcap_compress/wannaCry_09082021.pcap.gz", "Binary": "binariosRansomware/wannaCry_09082021.exe", "Scenario": "NAT", "Hash": "4677ad996f48b802b2ef1e9b64901504", "Family": "WannaCry", "TxtSize": "3600", "PCAPSize": "4800", "SampleTxt": "samplesTxt_compress/wannaCry_09082021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/f02bf0ee736e9fee8372772e207c5ec83af23e0521f5e0346e15ea584b4e8e36/61110be792205d251b579aec", "Date": "09/08/2021" } ], "91": [ { "SamplePcap": "samplesPcap_compress/Shade_24072021.pcap.gz", "Binary": "binariosRansomware/Shade_24072021.exe", "Scenario": "NAT", "Hash": "a9f7fbb9c23ba12420612c9f2ed5b813", "Family": "Shade", "TxtSize": "2100", "PCAPSize": "4700", "SampleTxt": "samplesTxt_compress/Shade_24072021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/9edd17e6a6d95ae848f9e77a605bc5e88f2a200ce1be66c83cf071f06c14b31c/610670a71df86c684a59489c", "Date": "24/07/2021" } ], "92": [ { "SamplePcap": "samplesPcap_compress/Shade_16092021.pcap.gz", "Binary": "binariosRansomware/Shade_16092021.exe", "Scenario": "NAT", "Hash": "7de11b4433592c186def66e5cf7a49d6", "Family": "Shade", "TxtSize": "2600", "PCAPSize": "4700", "SampleTxt": "samplesTxt_compress/Shade_16092021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/e10e13eee3a5bc9ec3d66ac44ebbda21d901be345f01d393f3d4dad26dde1afa/614352f0d3153459c56be8bd", "Date": "16/09/2021" } ], "93": [ { "SamplePcap": "samplesPcap_compress/Shade_15092021.pcap.gz", "Binary": "binariosRansomware/Shade_15092021.exe", "Scenario": "NAT", "Hash": "56f0757d01c87b17d0160bda0b46418e", "Family": "Shade", "TxtSize": "2900", "PCAPSize": "4700", "SampleTxt": "samplesTxt_compress/Shade_15092021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/dc7f4049d7b307f7505cfd0e46dc517c5933c3fd05db77b81520609002991c28/614207044fcab91a9e48d15b", "Date": "15/09/2021" } ], "94": [ { "SamplePcap": "samplesPcap_compress/Hive_06082021.pcap.gz", "Binary": "binariosRansomware/Hive_06082021.exe", "Scenario": "NAT", "Hash": "c3aceb1e2eb3a6a3ec54e32ee620721e", "Family": "Hive", "TxtSize": "1900", "PCAPSize": "156", "SampleTxt": "samplesTxt_compress/Hive_06082021.txt.gz", "Link": "https://www.hybrid-analysis.com/sample/77a398c870ad4904d06d455c9249e7864ac92dda877e288e5718b3c8d9fc6618/610cf4bce2a4dd42e7494966", "Date": "06/08/2021" } ] }