General

  • Target

    a62f7e160d80e2ff5a1cc80a5b3382896d2397d72994745c80a1ee7479773212.exe.compressed

  • Size

    99KB

  • MD5

    413f4d41a4ca6d901fb871247d178018

  • SHA1

    d4cb7f66f2e24b0da053ecf71bad90f72b3f4d24

  • SHA256

    bc20aaa04f01f955c214437c1e52d6b77fd3bd2f09795503a1c8f7129550a923

  • SHA512

    6520748c11bce83913184495cb16ca7086c7e99b625df0f81f5fe1371bdae0c36d846db542ce9e3c56dbcf02df60ebf1a0589ca761ab3b21cb55f152528d8b69

  • SSDEEP

    1536:pIj4cF++QyL2iQfxIrWgC8dyy5qIDcE7o1w2aauag7dnpc2L1dYRJv89YUguTM6n:YhVaiQ8VX/cE7EoZFFLPu6Fg

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • a62f7e160d80e2ff5a1cc80a5b3382896d2397d72994745c80a1ee7479773212.exe.compressed
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections