General

  • Target

    b059e4b5ad430857fca1ea84883fe411_JaffaCakes118

  • Size

    44KB

  • MD5

    b059e4b5ad430857fca1ea84883fe411

  • SHA1

    51d540f0d650909583a569f5b0f99048843fbeea

  • SHA256

    6eaa1001a2ec34329b289bb4bc17bbcb574575c1b08deaed438f3604c1a6cf84

  • SHA512

    4921fe08da2ad84003c2c53385e6c9e921d5806a65c275a371ebabf91ec5e27df74ae403080452eb2296cec1f17be9a81f9e2e422a3e15baceed58eadcdd2e76

  • SSDEEP

    768:98wUydUxAhKV+nehAReb9DrhpDQevpElghnNXeshd85S9M8cthoOtOUUg:CF2XeAeBhCeqYnQshdfCRgUUg

Score
9/10
upx

Malware Config

Signatures

  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • b059e4b5ad430857fca1ea84883fe411_JaffaCakes118
    .rar
  • ha_mailpv/mailpv.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • ha_mailpv/mailpv_lng.ini
  • ha_mailpv/新云软件.url
    .url