General

  • Target

    edb009abc00755d2a907d0e001cd8f5abbd5c187ece58efdb902afbe9ff0f54f

  • Size

    35KB

  • MD5

    16a98d2e8cd2486f94e7e5173ff92e9b

  • SHA1

    26562f468a482b1a04ba692eae0726691996f1aa

  • SHA256

    edb009abc00755d2a907d0e001cd8f5abbd5c187ece58efdb902afbe9ff0f54f

  • SHA512

    a5a575e84c7428ab04a6f81199687d7536cfd8216628d574547f6bda0c3c0ad26fcead1b211b2b139d7d551b8b2e38662fcc3797bf9f288b194e160fe7591b69

  • SSDEEP

    768:86vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:78Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • edb009abc00755d2a907d0e001cd8f5abbd5c187ece58efdb902afbe9ff0f54f
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections