General

  • Target

    4f7759bf7d91a20c83e77bba6744a82554497afc3c37b30c0207e71b97ebf9bf

  • Size

    99KB

  • MD5

    0f1bcde9d5044aed472a16b117bb5055

  • SHA1

    c352b5a8cefa5bec9463dbfbc7f87e4dd4514ddc

  • SHA256

    4f7759bf7d91a20c83e77bba6744a82554497afc3c37b30c0207e71b97ebf9bf

  • SHA512

    6bfc2131bd4f09009dfc20abb5b93d94d34ab70ff0967046837e40140687649482bc86fb4fccbd2b96a419469ec8e5b699cdd302477d98356f6a0a1b71e0f247

  • SSDEEP

    3072:GAtaohgelT+4x6oyZ8f85Uc+CfAuC5Es71lhF:+R8hfM086y+Es7

Score
10/10
upx

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f7759bf7d91a20c83e77bba6744a82554497afc3c37b30c0207e71b97ebf9bf
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections