Resubmissions

22/08/2024, 06:35

240822-hcqn2stape 7

22/08/2024, 06:34

240822-hb4vaawgjl 7

22/08/2024, 06:29

240822-g87rrswepm 7

22/08/2024, 06:01

240822-gq2g2avgmk 7

21/08/2024, 08:35

240821-kgztmasgkj 7

21/08/2024, 08:30

240821-kenctayemf 7

General

  • Target

    Eduard Gomberg.zip

  • Size

    1.4MB

  • MD5

    d71e958a06b2b8c34114fa54bbd89d3c

  • SHA1

    01c7d08bf249d02511af5b3c3c243fc319a80d65

  • SHA256

    7e4f19f682f2ea7ccb18aaf7e5d37141d2b849af2def68a7a22e4140298d98b7

  • SHA512

    17071facfb366a8d135a0ac57bb41cb38b4c92ca20d07cc54783ab08712d11dc04c478cbf78d9b36d84350f8be65e74e3975c5f3d95c7b928d2457544c806619

  • SSDEEP

    24576:PkBz8qC2oXT/ARBb6lJ1Np3pgC5XjbFDK0A7fupdv7o2EK9U6LFVma9J:MLC2ckML1Np3d5dK0RpSDAXz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • Eduard Gomberg.zip
    .zip

    Password: infected

  • eduard_gomberg_cci_com_kz\Documents\Microsoft Teams Chat Files\Reader_Install_Setup.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Exports

    Sections