General

  • Target

    9cd30722c8cf926b4d1142d0a378faecddc4c07e49b52eddba238b5dddcb1132.exe.compressed

  • Size

    442KB

  • MD5

    04ea3e601439aeb8c334fd100420a06c

  • SHA1

    f77e5fe96f5514fb1522af9a210b733e92156cf9

  • SHA256

    b9ac717e2d8ff4d65f410b3f3df8806368ea8b89ad6406ef9545a3a3b053350e

  • SHA512

    4f14a32e250c4bb4131354c9b0bb5d9c3c24cf49a4029986574e08a9f0f7b6ce877091930d2f10eacde5a29b8951b34526d59471238792ef06ab4adad72ada66

  • SSDEEP

    6144:tiMjX3En9o3Chide4wlP5HrJTlFjmfZ9H:tr3E9bhKeFlP7

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 9cd30722c8cf926b4d1142d0a378faecddc4c07e49b52eddba238b5dddcb1132.exe.compressed
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections