General

  • Target

    3384e74b3519797c989c8159cdb2626f7e73cb0126f076a9f8ca464cc9f75ffe.exe.compressed

  • Size

    99KB

  • MD5

    1aa8cbc4aaffe42903a273e4abf1c455

  • SHA1

    9269928185230a76519dee8ab7e4822d43f271f0

  • SHA256

    57e1189851a7fd9c64a9f992b6adf5e9586a564d2d3cef42fb1f9dd7f781b0c5

  • SHA512

    50740ca0243a08d22c15f4e92e4d19a8305eeaa204d7cc557e915222d5f5a5a0891a069d3405c5a5fda02561ef1190c1cafd9fce2708a9fd6a77a71aa56c8e7c

  • SSDEEP

    3072:ZMiJSuICoVLop3pYTGGcBtkowoxxnNycSi7LTl:PguYq2GGEkowCFpZfT

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 3384e74b3519797c989c8159cdb2626f7e73cb0126f076a9f8ca464cc9f75ffe.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections