General

  • Target

    bb8472bb5ce410b3aa85389a15fc1028fe5c98b6c4955593f27f387b10cb9254

  • Size

    35KB

  • MD5

    6ff32439d9355ff831be91579c202551

  • SHA1

    8657f981ac07473006f0c463c9a0a1685faa7ce6

  • SHA256

    bb8472bb5ce410b3aa85389a15fc1028fe5c98b6c4955593f27f387b10cb9254

  • SHA512

    f0df7d1e3456f9a5d6dff1e7a02be213559698fa3ad1c2331f1f5ffba235300f86957399a00cb82f3e6ecee93d9e9e8754c5dafaa5fb443e99da304fd1388a0a

  • SSDEEP

    768:V6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:Y8Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • bb8472bb5ce410b3aa85389a15fc1028fe5c98b6c4955593f27f387b10cb9254
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections