General

  • Target

    9ddfad74befd079b347ffdaa87e54f05d0936a4f4abd48d06d4e3dac73ee2d7c

  • Size

    35KB

  • MD5

    96ee4ecb94215838d655e1674fd38df7

  • SHA1

    78423fe657d23b7726957976e9a620dcac8e4332

  • SHA256

    9ddfad74befd079b347ffdaa87e54f05d0936a4f4abd48d06d4e3dac73ee2d7c

  • SHA512

    508d1e4d44c02cbcc3fa0b7ef862cbc3be1b25bcba65b085bd3f0d37e9abe1212d08d966d6a42e38cfed9d901b2666fc39240fd1b1607eedd04711f2af027609

  • SSDEEP

    768:h6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:s8Z0kA7FHlO2OwOTUtKjpB

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 9ddfad74befd079b347ffdaa87e54f05d0936a4f4abd48d06d4e3dac73ee2d7c
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections