General

  • Target

    6833c8e1e1ab2d91b54e1c7f1227d8bb333ee97dd41c876af4ea5296f0865c08

  • Size

    35KB

  • MD5

    5875acd4e925efbb5bccd5706c450d0a

  • SHA1

    9be835e982ef9df356acdac854b9df0fc455427b

  • SHA256

    6833c8e1e1ab2d91b54e1c7f1227d8bb333ee97dd41c876af4ea5296f0865c08

  • SHA512

    1a6db049e886d7a636f4779f46abc74d5b965c2bc1dcb79e45d1eae525561c0e7dce6cfbf4d82753f2107cbe5309f17ee8c8b55d23ecac9ef57b0719bfccd349

  • SSDEEP

    768:n6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:68Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 6833c8e1e1ab2d91b54e1c7f1227d8bb333ee97dd41c876af4ea5296f0865c08
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections