General

  • Target

    Somoto.zip

  • Size

    130KB

  • MD5

    3387f0112fa04d36c45a82ee0a5322db

  • SHA1

    d7c4da148e0b61d39cd8b895b16f826f4e9aa398

  • SHA256

    8ec1c71e228993cfabc0a084c47e3c5ea63e0f8a74f5dc46eaa2e0a2717b4c22

  • SHA512

    c84cea43f9d7f67fc6374bdaa47e31e6377563037e083f0a1be1a4f9f686847c1e7dac2f520e7e2af9d485bdc12b2ad120c62fe2ded94713160514992667b480

  • SSDEEP

    3072:2bBpr6RjkNdy2z3qR4m2AFt5ptjcsYfHNWhcY4iJRMVx2MuLSqqRO3jn3EGzd0:2NIRm78zVFtRlitWhcjiknVueqoO3bUF

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 1 IoCs

Files

  • Somoto.zip
    .zip

    Password: infected

  • 7ZipSetup.exe
    .exe windows:4 windows x86 arch:x86

    28a099a911237a28521d8b7ea250f089


    Code Sign

    Headers

    Imports

    Sections

  • $TEMP/biclient.exe
    .exe windows:5 windows x86 arch:x86

    e90e65bdaffec07040f15392a1f74d82


    Headers

    Imports

    Sections

  • $TEMP/config.ini