General

  • Target

    00de7a350c79ab7fb55f821a590fdbdcc887e07450ca08c0237f154a29297a32.exe

  • Size

    442KB

  • MD5

    74b4e94ad8645990e2affe1f7b79bb32

  • SHA1

    ba7d86f487743b889390a44d0e390b8be45c9c3a

  • SHA256

    553424e113188f268ffb4e7f2e831815fe6b116866bd4e3a535ff0cc0332a267

  • SHA512

    4321aa7a7d704909e7cc3d18a1a1f87ed27af0d9a87640c6b82504028178dd645e7617294086e07bc012ec8609ef461bc24c834c2cdd74a5de26bf62cddf972c

  • SSDEEP

    6144:aiMjX3En9o3Chide4wlP5HrJTclsML0J9qtd:ar3E9bhKeFlPPMLiu

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware 1 IoCs
  • Detects executables containing commands for clearing Windows Event Logs 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 00de7a350c79ab7fb55f821a590fdbdcc887e07450ca08c0237f154a29297a32.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections