General

  • Target

    Velocity 713.7z

  • Size

    38.9MB

  • MD5

    600db85d0896bd4ca64d3e1cf28d0d6c

  • SHA1

    53b07fda993398ff39b15ad9f9af9e0a72d116d6

  • SHA256

    fcd4d4b1141a138caa8ff7d192b533b45dd421f0a72ca1d2779ad27e5548ff5b

  • SHA512

    60ef4034e55e3ef47d597fc81bf6c259b68c7ca086c14f24d2fcd783540245bd050b737e4c7ae6e8ef75b96d22bba91d528990e3449c5de87ee97b18d5f1c67c

  • SSDEEP

    786432:1aGIgd3ChvuFQaaMHvNn2lMCKaLO1TVEQYoa4afxFqlQS8SdU9ztNOb4nBW:tSFQ7aMPNnUDhO1T1pcvOQSPiObl

Score
10/10

Malware Config

Signatures

  • AgentTesla payload 1 IoCs
  • Agenttesla family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • Velocity 713.7z
    .7z
  • Velocity 713/Guna.UI2.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Code Sign

    Headers

    Imports

    Sections

  • Velocity 713/Velocity Spoofer.exe
    .exe windows:4 windows x86 arch:x86

    8c16c795b57934183422be5f6df7d891


    Headers

    Imports

    Sections

  • Velocity 713/key.txt
  • Velocity 713/velocity spoofer.exe 
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections