General

  • Target

    cba62e121e0392109683d5d64b420d92f4209eefdb5ebbf33bde9f10c4ba0fb5.exe.compressed

  • Size

    99KB

  • MD5

    12079c56437c2c476f5039cccf5af2a5

  • SHA1

    3d3536530b69fdb05a2c57f8a2aa2af8860553fb

  • SHA256

    5ca14b40f45b0ca8d572df1c2af55fde53b5fc266e8a57357054425f6153bce5

  • SHA512

    13d89bc0171397cd1586e4982b2d8718a1f9bc094bcc9b2c8bf7c7b27cc77988175a2d4fbcc2d699c771947630a55ddb1a9cb8f284b1f2db230b2ee0a5852e58

  • SSDEEP

    1536:xIj4TiDiVZPZJExlmEIsD/23WoYXEQx/6PpYau/vTdzNBLQT5Gpn:AzGPP/4hD+3WoYXp3xNBLQ

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • cba62e121e0392109683d5d64b420d92f4209eefdb5ebbf33bde9f10c4ba0fb5.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections