General

  • Target

    d2a957b4890b5545a2a8468674e775f8b55860711e2ab285541fe953a1fbba0a

  • Size

    35KB

  • MD5

    08d3a97b57bb915283875fd6d0545095

  • SHA1

    2aaeb62497c18a9d73531e51e2f019e3fa41ff62

  • SHA256

    d2a957b4890b5545a2a8468674e775f8b55860711e2ab285541fe953a1fbba0a

  • SHA512

    c31742773e33d72c97c91288371958a7d62296698522651fe676edc210d685abb93cf9cc3762495cf6d5540f421ab5f362101cc83c4767de86f388226e1ad577

  • SSDEEP

    768:E6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:T8Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • d2a957b4890b5545a2a8468674e775f8b55860711e2ab285541fe953a1fbba0a
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections