General

  • Target

    d9a11e95c6f0ca3172e93f161899f355153758153a874aedf696f6dfad54719c.bin.sample

  • Size

    7KB

  • MD5

    22e24db95c0a449699a4174444adf6c5

  • SHA1

    0656ad195e2721745f2e46b851e8e78f8f4e2ee4

  • SHA256

    d9a11e95c6f0ca3172e93f161899f355153758153a874aedf696f6dfad54719c

  • SHA512

    75080dc5dfcfb19bfa327035afeedd6f2ac957fd5e28c552d42a66fa008e2cf7bf4c62ca2a82433347c92e7079ca2a5fefb157751674f804f83b7f1e5c52796b

  • SSDEEP

    96:WJZhl8wdS+r3yOYW189fTwUVF0CWHyjk8P1LOmjXfihExFNw0mR7Dk3nzMUA:4zdrr1FG1WDCgmjPZ76kXzMUA

Score
10/10

Malware Config

Signatures

  • Detected Xorist Ransomware 1 IoCs
  • Xorist family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d9a11e95c6f0ca3172e93f161899f355153758153a874aedf696f6dfad54719c.bin.sample
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections