General

  • Target

    Nova Temp V5.9.zip

  • Size

    39.8MB

  • MD5

    193f8a5a14b124b47de66d03feeb0c74

  • SHA1

    0633689677f50e9710e43c155b8a58834c4b6378

  • SHA256

    95d98f71839a7a7dc14e61c0469bdd3a791cce6451d597447d9b8bef1a27ebd1

  • SHA512

    ede89e02bd92832937d88abbdfa57f7541637b2b03432631c8c4fef1735ec6e13820a5e6a22d752c363d4c7aef732d8061964e67c0fb54ee8361d628e54865c4

  • SSDEEP

    786432:OJw5Ta0XshNDRFgk9zJKAQj2NsaHJeQLBGaqIqz7LgYgflfaqjRFacU04vHmpg0R:OJw5Ta0XaNNFgwJNNNrD9lwcV76cU0rh

Score
9/10

Malware Config

Signatures

  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • Nova Temp V5.9.zip
    .zip
  • [1] Run First/RUN ME TOO.exe
    .exe windows:5 windows x86 arch:x86

    1a5cdbf711fee14b077e599d13fddab2


    Code Sign

    Headers

    Imports

    Sections

  • [1] Run First/RUN ME.exe
    .exe windows:5 windows x86 arch:x86

    1494de9b53e05fc1f40cb92afbdd6ce4


    Code Sign

    Headers

    Imports

    Sections

  • [2] Monitor Spoof/CRU.exe
    .exe windows:4 windows x86 arch:x86

    cafc89e1b0a9b2c5b10389d6d19936ce


    Headers

    Imports

    Exports

    Sections

  • [2] Monitor Spoof/Monitor Spoof Tutorial.txt
  • [3] USB Spoof/USB Spoof Tutorial.txt
  • [3] USB Spoof/USBDeview.chm
    .chm
  • [3] USB Spoof/USBDeview.exe
    .exe windows:4 windows x64 arch:x64

    0ca732aa2f0b1bbb2736fa8cce06852e


    Code Sign

    Headers

    Imports

    Sections

  • [4] Nova Spoofer/Nova Temporary V5.9.exe
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections