General

  • Target

    Rootkit.Win32.Plite.pfl-4da0a105f449fefd5d155027c377d50abcb950f557b6be7f83b8cf2e4635437b

  • Size

    366KB

  • MD5

    4f36d6384cd7846058627b628effbec0

  • SHA1

    00641f117d19b2d208f4ee7c01d8b2eddb63624e

  • SHA256

    4da0a105f449fefd5d155027c377d50abcb950f557b6be7f83b8cf2e4635437b

  • SHA512

    2fa1b4d322a34da4dcf572d035100a62ae2c839fb3e40cd3b95b3e6546a72333778d9354ab75156e85639430f3295958d6d68fa09ff8e4fada86e9490ce7a893

  • SSDEEP

    6144:1o3whi+1Py3V0a24kOn+Sr72iyjmhuKtUYiw52hVOcvBRMHkWYHpZq4:YKf1PyKa2anKjm3OYZ2hocvH5

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.165

218.54.31.226

Signatures

  • Urelas family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Rootkit.Win32.Plite.pfl-4da0a105f449fefd5d155027c377d50abcb950f557b6be7f83b8cf2e4635437b
    .exe windows:5 windows x86 arch:x86

    b6852ed4e334147c4929ea4ff7285899


    Headers

    Imports

    Sections