General

  • Target

    194cfb88b1665569a05ca71f254ee6088452eac9dc6186d78bacc27f15071b3f.exe.compressed

  • Size

    99KB

  • MD5

    59e3ee040721c50c73f6799a7d24c191

  • SHA1

    5833b63519466598d9e8a8aed9bacb497ada3552

  • SHA256

    56362155c40d42d9a4dbdda2d775248985e1defbeeb794af4eabf8f179674dfe

  • SHA512

    efec00893172ea23d8135076d5ffb6b7ebc6662c61cb89862ac3637e2f38dfd9d375ef1e4b2fcca0c73f789de64cfef826a9221886786d142d70da507cef308a

  • SSDEEP

    1536:gIj4IaWd0ni8l4ZOtIsdm+s2sQ4yFVP8eflx69g6KWmhPK39Ijs4248YaaFQ2nDM:VPv8QOrmj211/1flQSvJhST48

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 194cfb88b1665569a05ca71f254ee6088452eac9dc6186d78bacc27f15071b3f.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections