General

  • Target

    f34069d96df9c1b3e9d2d615ded64e755c9ae5d7375a357c9fa48ed491393f1e

  • Size

    52KB

  • MD5

    eb8b42f50f5a7f50452ad69f28fedc6b

  • SHA1

    a3c8eee1b3c6c6787274f63fd65637afec86f6cb

  • SHA256

    f34069d96df9c1b3e9d2d615ded64e755c9ae5d7375a357c9fa48ed491393f1e

  • SHA512

    c72be395aefce5b5db19009d01b4549fa5220abbd21219bd6af75e393e081a4f194be44d4685dacd255e12290682019f2bac1175ad569619a0b17f3aa2110ab9

  • SSDEEP

    768:5XHPb+71O4G+lpqg6d6uGH3MZVDruM1BH5FiKTsg:5PS7JLpqZd6u5ruM1Ribg

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f34069d96df9c1b3e9d2d615ded64e755c9ae5d7375a357c9fa48ed491393f1e
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections