General

  • Target

    6af49208d3dfba923c48ccba6396df933cf30917567390aa6656c986a354cf2a

  • Size

    35KB

  • MD5

    1c510f980c3c8b99ee19f7b0a2983b4c

  • SHA1

    83c5b6e228f6fb1cd3226981f80dee0c90bbe442

  • SHA256

    6af49208d3dfba923c48ccba6396df933cf30917567390aa6656c986a354cf2a

  • SHA512

    c30611d2a7ffe2693d8805f2970a3790cbee0af1a37ad2eddd29ed63464cbeec417913a970f48ce549081b97481a7437c29f0b60023a21f6cd8bb11bace51560

  • SSDEEP

    768:U6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:j8Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 6af49208d3dfba923c48ccba6396df933cf30917567390aa6656c986a354cf2a
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections