General

  • Target

    2c626e6c6842cbe395e319ea5a9c809f3ed709a059acde9bfb7b2bd06caae749.exe.compressed

  • Size

    99KB

  • MD5

    44e8212bb5feeb5a92b0b4a88e501cee

  • SHA1

    f3a9c290956d62c1422fd1d30e32795f0e2c7bc2

  • SHA256

    17b60cfb97cfde1a6c876a352084bbe4e92db54e7596b33a74a9b61a315d02dc

  • SHA512

    31d669b8c89c88a9a7a7d9d9ed7704b4a16a2401cab55e627c7788857c7cb7aa1fa5ee117a84eb5523f75fcec724364e432c79c00577c23f151b0bd88f38e739

  • SSDEEP

    1536:aIj42aWd0ni8l4ZOtIsdm+s2sQ4yFVP8eflx69g6KWmhPK39Ijs4248YaaFQ2nDM:nVv8QOrmj211/1flQSvJhST48

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2c626e6c6842cbe395e319ea5a9c809f3ed709a059acde9bfb7b2bd06caae749.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections