Resubmissions

12-02-2024 18:10

240212-wr4q4sah2x 10

12-02-2024 18:03

240212-wnazmaag9w 10

General

  • Target

    Archive.zip

  • Size

    6.6MB

  • MD5

    907eddd8b49c9626bebb19d4f1134f3a

  • SHA1

    1ff699fa997b2d1664d321de2c463c77fc980eda

  • SHA256

    300fb853b15b9ad39e3f5dced1526e6715b7161296288dd04dfdc17c005daa62

  • SHA512

    b7f3305c36f01ff0bf2d9190ca1394276dcbd5bda9421d1b22dafd56785f5744e65bbcc43d2cc5e9356d216ab4e5e063d1d41a5b4b689f66079fadcd8b917b54

  • SSDEEP

    196608:oUTTwkTYare8Dehfc1liwHFQnvvQgkBo11E:ocvMaXgE1liwyvYgksE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 6 IoCs

    Checks for missing Authenticode signature.

Files

  • Archive.zip
    .zip
  • Lopo/payload.exe
    .exe windows:4 windows x64 arch:x64

    17b461a082950fc6332228572138b80c


    Headers

    Imports

    Sections

  • Ransomware.Hive.zip
    .zip

    Password: infected

  • 211xahcou.dll
    .exe windows:6 windows x64 arch:x64

    c7269d59926fa4252270f407e4dab043


    Headers

    Imports

    Sections

  • Hive.elf
    .elf linux x64
  • hive.bin_exe
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections

  • hive_linux_elf
    .elf linux x64
  • linux_hive.elf
    .elf linux x64
  • sjl8j6ap3.dll
    .exe windows:4 windows x64 arch:x64

    41c5010ddf565637768fe5e98ec05457


    Headers

    Imports

    Sections

  • windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections

  • zi1ysv64h.dll
    .exe windows:6 windows x64 arch:x64

    c7269d59926fa4252270f407e4dab043


    Headers

    Imports

    Sections

  • __MACOSX/._Ransomware.Hive.zip
  • __MACOSX/Lopo/._payload.exe