General

  • Target

    EDa0JKVgKZayN3vH.zip

  • Size

    26.5MB

  • MD5

    84924b275034b9dcc5330ad6fe841393

  • SHA1

    3b05a08a007e2aec32dc581c2989c4a249e04ab6

  • SHA256

    ec7c97c7f8bea5e4d29c65a5a8bbeb2e5e6c40eacaaad47bf095b935ce5511f3

  • SHA512

    a5c8abe817abfa9153ae728f502bc2726307d67cadd5b41688012757800ffd7c1a0ea74ded21fcbf755995113547d907ac5a62e755f2eae55255705fe0ee9ba5

  • SSDEEP

    786432:mdkt/3a73MAZ5EjdwiJKWVcH2Qb8BXz7QG:mS/JAZ5ywiJ03aXAG

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • EDa0JKVgKZayN3vH.zip
    .zip
  • EDa0JKVgKZayN3vH.exe
    .exe windows:6 windows x64 arch:x64

    7d65f8eb6b074fdbf2da571e2dd683ac


    Headers

    Imports

    Sections

  • dControl.exe
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • guide.pdf
    .pdf
    • https://content.overwolf.com/downloads/setup/latest/regular.html

    • https://emojipedia.org/euro-banknote

    • https://emojipedia.org/fire

    • https://emojipedia.org/hundred-points

    • https://emojipedia.org/tongue

    • https://medal.tv/