General

  • Target

    crosshair editor).zip

  • Size

    250KB

  • MD5

    11cfa244d8fa5ce29005fa92742851bc

  • SHA1

    0767f6bc2caea907ba78916e8125dbf35f5aa51a

  • SHA256

    6b7523f50fb8fb84d307b205463ee32f8eebf0f99f3eae73cc6d73eb7d023c29

  • SHA512

    b11c7d7db38b9055f751dd0a8c88feafc3bb8c5363cf84df77691c29cb20545a5a98008549f2b890dfe2dde1344d81f8c02dff45b76e60c8f2f3cc84cfaba2da

  • SSDEEP

    6144:++FirqEMzSZRQzaaoIxAZT++AcJKl57psdn75Qtsyx:5a8SZRQFWkbIdSsq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • crosshair editor).zip
    .zip

    Password: 1337

  • Freya.dll
    .dll windows:6 windows x86 arch:x86

    Password: 1337

    cbc458e67114e2a84ebb669d0530f7b6


    Headers

    Imports

    Sections

  • Freya.hl.exe
    .exe windows:5 windows x86 arch:x86

    Password: 1337


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • injmthd.ini