Malware Analysis Report

2025-08-11 06:11

Sample ID 240610-1kalxascpj
Target 49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152
SHA256 49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152
Tags
upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152

Threat Level: Shows suspicious behavior

The file 49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152 was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx

UPX packed file

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-10 21:42

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-10 21:42

Reported

2024-06-10 21:44

Platform

win7-20240508-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152.exe

"C:\Users\Admin\AppData\Local\Temp\49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152.exe"

Network

N/A

Files

memory/1976-0-0x0000000000400000-0x000000000041B000-memory.dmp

C:\My Downloads\Battle.net ISO - Full Downloader.exe

MD5 88ff3d7f064592ab22a524228c3527a3
SHA1 eee957388818f349850dfc4a9dbe898ec64a84b2
SHA256 04d6264866058db4bd2ae684f8a81114621afc27a33d3d16d3c34c1b545e2793
SHA512 42028806fe94030f668f3b1a29a310d257e4de8e6d8dd68bf7aef76a8399d54c21f6b073f7c790254d1651ef8b849bf7c0ce846e8be967b9cc2c444e4f7d31cc

memory/1976-101-0x0000000000400000-0x000000000041B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-10 21:42

Reported

2024-06-10 21:44

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152.exe

"C:\Users\Admin\AppData\Local\Temp\49ec009cae6a05ad9343231a903b9e37cc2dc3d8307f3fb03c279446cf1a0152.exe"

Network

Country Destination Domain Proto
US 52.111.229.48:443 tcp

Files

memory/3440-0-0x0000000000400000-0x000000000041B000-memory.dmp

C:\My Downloads\Unreal Tournament 3 Crack.exe

MD5 f2796928a5697d839d81d76f270ebd85
SHA1 4ed62e9b87366d0888f7fc85a46f5021146072f2
SHA256 4089cf78cdb3f44bdf97d8f22e0626dbf2a3cc1b17241ead44e2c66d6fd8e1bd
SHA512 840a4d5690f413b5b24206a7ab3e9f684f173e6822b54d8d6054b3734c63153c8300f6d9265b1d5dca0a77fa1d273fb74dc2a4ad8520bc6e62cea525e2903945

memory/3440-101-0x0000000000400000-0x000000000041B000-memory.dmp