General

  • Target

    e0e042f647e4f25e91918ac9af77405a7f9001980228b8f7c9b65690bcb3f031.exe.compressed

  • Size

    99KB

  • MD5

    d2bb961a759c008561a01157afcb333d

  • SHA1

    38647d3c408aea52f17225df48d00ffd4e411d54

  • SHA256

    4653c92bda89dbd012629642f9eddd08cfae69c22152a253e1e464b220a7df5d

  • SHA512

    af2b2c689cea436cf8e2f92c7727601c230a32facb7b3095188cc99ef15402e0b7354cf2026377dec0884b4e07e323495b2b924aa369797d7268d236622b0b87

  • SSDEEP

    1536:QIj414koTSn96Qz/YkrlbNEAjNrkN8Wy11VwpC6GX9zpZtrR6Shhd9on:FYBD6QDrULy13r9zpZtrR6SB9

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • e0e042f647e4f25e91918ac9af77405a7f9001980228b8f7c9b65690bcb3f031.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections