General

  • Target

    9f0465959a8eb8323eef006f88624a44daa05d8c70e10b38ae9203d34d3c5a99

  • Size

    35KB

  • MD5

    f5b3863ff5d41662d3f40477236e4542

  • SHA1

    6e83b7aa5204b59944be10bd1b1fecc7aa71de89

  • SHA256

    9f0465959a8eb8323eef006f88624a44daa05d8c70e10b38ae9203d34d3c5a99

  • SHA512

    c4c034b72c0147c7f8b9ab1f90cd4c153845b47fa539d9fd7a038ae6e78f17f5e95456ddefbc9852d08582b5bc0d7bcbb63a187b4247011665b32e00ac6ed1cd

  • SSDEEP

    768:q6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:p8Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 9f0465959a8eb8323eef006f88624a44daa05d8c70e10b38ae9203d34d3c5a99
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections