General

  • Target

    244131ca1f2803e2519ffca81218c710fdd8f2f9eb4ba8222b1e03c22db2a466.exe.compressed

  • Size

    442KB

  • MD5

    676b8bdd3f4792f259f4d1a0f42f366a

  • SHA1

    8afc440eaaba3dc64d74e49a77fb0c4dad3a3685

  • SHA256

    8f3c4d3e240900d8026d41e8061eab11a86d8493a6afb2fda263ce3d883061e0

  • SHA512

    961719c6229b4afa3fec4628a0335bf0833a2c65e790a59e8cd58cd5ae5a2ff35bd48a4958015050f497fc6312264face4e7ea9532ed3dd56c7e76d3ddd1d0c5

  • SSDEEP

    3072:+FHCuFdjX3nEnZjLo3ChirBtRix4wBblxgNuhPXHrJTkzlLH0vx8MwkpXx6/0OyD:6iMjX3En9o3Chide4wlP5HrJTmM1h6

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 244131ca1f2803e2519ffca81218c710fdd8f2f9eb4ba8222b1e03c22db2a466.exe.compressed
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections