General

  • Target

    d42914d47ef4fe1cecde148c63e325b402ed4390f3d0c977f05fb7ee7bdfdf9d

  • Size

    4.4MB

  • MD5

    3eb5796bee506658f21c56a1da03e66c

  • SHA1

    672c26da5ab7b74007832535d725baf2638f6a53

  • SHA256

    d42914d47ef4fe1cecde148c63e325b402ed4390f3d0c977f05fb7ee7bdfdf9d

  • SHA512

    13571a6e3e67f52d957c151d02fe196a2e6030d0c1baa215432cc154068029d5c7f9f61985e106f4a653beddd2142a17bc9d50127d2bbe8967f917662134e713

  • SSDEEP

    98304:+cNZSFzC1fET//JXwgIdtsWR65LSz4YSlNm7sq8kYYcEYuS:+GSNC1w/pwgIdHGYSlNNq8kAzuS

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • One or more HTTP URLs in qr code identified

    Detects presence of HTTP links in QR codes.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • d42914d47ef4fe1cecde148c63e325b402ed4390f3d0c977f05fb7ee7bdfdf9d
    .zip
  • HEU_KMS_Activator_v42.2.0.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • 安装教程_必看.png
    .png
    • http://weixin.qq.com/r/dB364kTE0BmvrQCB90hm