General

  • Target

    1.zip

  • Size

    698KB

  • MD5

    258b7b479023ec3c9a68543d1d73768f

  • SHA1

    c51c4617f431a11762d42362b3bb9064028886df

  • SHA256

    63ec8cabad735d5bf5ed29c2ee17642b511d87d38f812606328fcfa8fb939803

  • SHA512

    669e14ff5f621754899e6d417e6862fdc026576cc73cbf5bc1198c173f163ad8bf58f12d70b88aeb63bd3611051f47728998a5647ef25469312deaba7586a098

  • SSDEEP

    12288:5M6xSufIrp7rWU7a3UMffDwx6uz0pmeP6/V8GylEOpHpm8H6aKqJdeAq:5M6xdfKHW+UUM3vQWQnylEOpUj6j4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • 1.zip
    .zip

    Password: infected

  • OneNote.exe
    .exe windows:6 windows x86 arch:x86

    Password: infected


    Headers

    Sections

  • out.upx
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections

  • OneNoteUpdate.ps1
  • Temp1_TCPView.zip/tcpview64.exe
    .exe windows:6 windows x64 arch:x64

    Password: infected

    c928863939b9bc9b79e9eea80b207d70


    Code Sign

    Headers

    Imports

    Sections

  • WerFault.exe
    .exe windows:6 windows x86 arch:x86

    Password: infected

    dccca514b2d26c18487ee9cc1ae31b86


    Headers

    Imports

    Sections

  • test.bmp
  • wmsetup.log