General

  • Target

    7c94228cc62634430fd4bf937a990c0a26550aab4ed34cfeff6eb5165f3c0888.exe.compressed

  • Size

    99KB

  • MD5

    65e3b2e4fb46ec43382c5304b6eb2988

  • SHA1

    d18faaef2862ee1270462272aca62a2613794c64

  • SHA256

    972a24beed8e8a8537ae0d388dc91a482b1326868ae7da7781e818ca72162390

  • SHA512

    db5910a64ce4d7c73ec59d95f8e80ad3be98a819eefdc7ec9fe0c4277e53cdb4ba626332bfeeadd3c973717fd95a474070ce19b7747f0a7a4d147f4009e6e66f

  • SSDEEP

    1536:uIj4uSWEWHMD99Ulx/085d9TtMtPprWrOleG3bmo5elrkQOD+S0en:TVDEWHMDclx/95natxu/noekQOD

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 7c94228cc62634430fd4bf937a990c0a26550aab4ed34cfeff6eb5165f3c0888.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections