General

  • Target

    4393b05a23f05af255589f1c32935811d2e6a8f112e54c956b8c52051e0a4669

  • Size

    361KB

  • MD5

    ee6d202c314430288e1babc3c9256f40

  • SHA1

    e1db7db841535428e0bd482b6fcd4e35a5ec7c33

  • SHA256

    4393b05a23f05af255589f1c32935811d2e6a8f112e54c956b8c52051e0a4669

  • SHA512

    ef6ef49b3e5a57a699b2802d2a53ff48db3230e68944bb1b69f8f77180c283055f2efaee59553c7e19371e0bb904084e178f26cea8312ca55e2280057552ecf2

  • SSDEEP

    6144:Ul6YqK05YIe1QlzZPGrllLF/NABJj7PF4eSvJHnmrKqslCjru8dkcVLf1DQ7LaaN:IlqKjSzZPGRlpU1F3SvJulXvVdDIpJXD

Score
10/10

Malware Config

Extracted

Family

webmonitor

C2

qqsola.wm01.to:443

Attributes
  • config_key

    jJYLbTB9TsvWtCPWrodDFU1k5EBbvtuI

  • private_key

    neS5F12vo

  • url_path

    /recv5.php

Signatures

  • WebMonitor Payload 1 IoCs
  • Webmonitor family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 4393b05a23f05af255589f1c32935811d2e6a8f112e54c956b8c52051e0a4669
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections