General

  • Target

    cc85b0344a1ff213a9d72d92d87c5a241e918742ec0b3f9b87a255cfbeb62033

  • Size

    35KB

  • MD5

    5fd005def736be626d8e3fcd142c1cda

  • SHA1

    e997cc4f9f9c4eaf944acf393707ed6e9797d5fc

  • SHA256

    cc85b0344a1ff213a9d72d92d87c5a241e918742ec0b3f9b87a255cfbeb62033

  • SHA512

    3d0d5bc25ca69664aae02faa6c456ebca1e100632f5bb9419bbc3c5e3d0c9bd4905fd120300c58339461cfc30bbd0b661399cc6f75e21e22aee53b3d9eceb057

  • SSDEEP

    768:F6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:I8Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • cc85b0344a1ff213a9d72d92d87c5a241e918742ec0b3f9b87a255cfbeb62033
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections