General

  • Target

    87048dfc4ab1870d98fead72302d0b86e15449a01541fb974dfc934bb0b614c6

  • Size

    35KB

  • MD5

    7f1787e4427443cfa6fcd609b67b800d

  • SHA1

    dd6c5579695e4c0450cc1c62dbf6bce6155cd6ff

  • SHA256

    87048dfc4ab1870d98fead72302d0b86e15449a01541fb974dfc934bb0b614c6

  • SHA512

    0fb7f9377bce305f79a9d8d4d33f4623f9c2fb0d779f6c4ba935bc0dc485009e2800a27870ecbdaefa8426466b2d385132e71fbe0b18f2a8bb2268905cbb610a

  • SSDEEP

    768:h6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:s8Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 87048dfc4ab1870d98fead72302d0b86e15449a01541fb974dfc934bb0b614c6
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections