General

  • Target

    2737ad9cc96e5de2eb6168b13797a46771b897ed3e2ebd5f1b68da0a8b065596

  • Size

    298KB

  • MD5

    d624b833b5852fee03fa71b1f0188b91

  • SHA1

    e849bf579e9e27b75478f544f9c760fee46d30d7

  • SHA256

    2737ad9cc96e5de2eb6168b13797a46771b897ed3e2ebd5f1b68da0a8b065596

  • SHA512

    847d1bac3f055cb481879ae54357501a4858160f1c1b2c8fdfe540b7fd63d056171865a8a28e213f24de646b0489776dc1fb5b4cf604b5c5257703e213aa5e6d

  • SSDEEP

    6144:q4dMcvVRZD5Db77WVJhgM55dh5SKjWHBmaVo+hqT2auxSsSAv5S5ue:q4dM8VKVN535SKzaVoaqT2JS355

Score
10/10

Malware Config

Extracted

Family

webmonitor

C2

fay007.wm01.to:443

Attributes
  • config_key

    LBQfJrFgUVHmlbfJUp1Fbu4mGo2YJ0rG

  • private_key

    BghO9pIGP

  • url_path

    /recv4.php

Signatures

  • WebMonitor Payload 1 IoCs
  • Webmonitor family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2737ad9cc96e5de2eb6168b13797a46771b897ed3e2ebd5f1b68da0a8b065596
    .exe windows x86


    Code Sign

    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections