Resubmissions

09-09-2022 20:38

220909-ze3vtscggj 4

General

  • Target

    nPlayerCX.zip

  • Size

    890KB

  • MD5

    4bc1f33c9c519d11bffa7621851adea6

  • SHA1

    de58a71bb374256c9a9e13f6f1fcc0675670024e

  • SHA256

    6c411aa7c7af65f580a6de8185f8f1586ead1eb45a698786e41cd662957be13e

  • SHA512

    5b37edd0bb31f2b42b72071678625e139c7d251ab5bb6e929ad27478bdf915c7584caf74e61705934082328c41d40215cfbbbb6573aeeb43d9b7bb601bb4625e

  • SSDEEP

    12288:Huzz5phs2YBbSDsZHWnn5Sp/yWuH4UOuuYoGW/obckFx+TvouwTLKxi:Azhs2YBbd+n5SZyoU5oj/2F4TQDT0i

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • nPlayerCX.zip
    .zip
  • CXDocumentation.pdf
    .pdf
    • http://www.erightsoft.com/SUPER.html

    • http://download.cnet.com/YouTube-Video-Downloader/3000-2071_4-10810714.html

    • http://www.ticalc.org/archives/files/fileinfo/426/42626.html

    • http://ticalc.org

    • http://games.com

  • ReadMe.txt
  • VideoConverter.exe
    .exe windows x86

    0c14036fec9cd85751f3ec2d1efbf7f6


    Headers

    Imports

    Sections

  • nPlayer.tns