General

  • Target

    4a9ba941ba32805cc6aab72820f80cf5ad149ae31bfd9fb1fe14d68d2a6532af

  • Size

    99KB

  • MD5

    25fbd398cbcdd7a9371ce180d61982f5

  • SHA1

    827f65907ff1abb0913bc327141aa0a0759766cd

  • SHA256

    4a9ba941ba32805cc6aab72820f80cf5ad149ae31bfd9fb1fe14d68d2a6532af

  • SHA512

    8c069eba7b51941c4bca6a5295647d896e40a3480c9ee4368d730ad030b035210f3f70a639b91cd101e5f87be328bbdf40aea62bdca10672967149da266b873e

  • SSDEEP

    3072:4UMcc6VP5Tjs6NazfjtG7lycCsmC5fOtk:hccnrNazfhG7lycCcBOt

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 4a9ba941ba32805cc6aab72820f80cf5ad149ae31bfd9fb1fe14d68d2a6532af
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections