General

  • Target

    48b66e7042dcc0d9bc1e2d62358359ea2be91d806ca5d66f2c8fcd2f11bfd464

  • Size

    660KB

  • MD5

    07ad34e2dd30e6f3ad3cf088b60aefb6

  • SHA1

    3cc0885ed4fc2a2ef982d697c78aa79440d08c46

  • SHA256

    48b66e7042dcc0d9bc1e2d62358359ea2be91d806ca5d66f2c8fcd2f11bfd464

  • SHA512

    b6801af5a835a3336fd2be7a2bc06e5c75072a8bcc8a928f4368e01c7db1cc166b15e08626356ff812ccbfa7f707973e15865ee5c414adc590e2b837f418adc6

  • SSDEEP

    12288:M7/tdDAgbl9ph5xwwb4mRNA6l09O1hzXwoH3/QRqDr30Zm7YiCgH66KZmqtt89go:+/fVPph5emMe06h8GPvj+mqttwgwL

Score
3/10

Malware Config

Signatures

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 48b66e7042dcc0d9bc1e2d62358359ea2be91d806ca5d66f2c8fcd2f11bfd464
    .zip

    Password: infected

  • eb0b731ab94af412b326ba86d043c128ce602337070895ec1b3d2bc4e0214091.exe
    .exe windows:4 windows x86 arch:x86

    61259b55b8912888e90f516ca08dc514


    Headers

    Imports

    Sections

  • $TEMP/Alot
  • $TEMP/Bathrooms
  • $TEMP/Book
  • $TEMP/Compound
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • $TEMP/Conservation
  • $TEMP/Emotions
  • $TEMP/Injection
  • $TEMP/Participants
  • $TEMP/Richmond
  • $TEMP/Website
    .ps1
  • $TEMP/Worm