Collection of Upatre Samples ( alpha version)

Config File for fcb74a70753f54288a88f4c43f956f8e

md5
fcb74a70753f54288a88f4c43f956f8e
source
malwr
link
https://malwr.com/analysis/ZGJkMDUwZGE3NTA0NGFlY2JlMWJkYTgyODRmMjE5MTQ/
malware_name
nolvacoh.exe
temp_file
NolvaTemp2.log
scandate
2015-05-26 12:11:52
parsed
2015-06-24 13:58:26
decrypt_keys
422c763c
check_keys
5fca3fab
c2_server
93.185.4.90
baseport
13920
useragent
Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
payload_format
reg
old
0
clientip
icanhazip.com
nr_targets
16
nr_delivery_sites
15
nr_delivery_sites_online
0
nr_payloads
0
ksa
pdir
TULK22
delivered payloads:
no payloads delivered when checked
delivery sites:
1
https://216.51.193.145/tulka22.png
2
https://93.119.102.70/tulka22.png
3
https://73.22.119.204/tulka22.png
4
https://96.46.103.232/tulka22.png
5
https://68.70.242.203/tulka22.png
6
https://66.215.30.118/tulka22.png
7
https://96.40.19.168/tulka22.png
8
https://107.161.207.151/tulka22.png
9
https://31.131.142.204/tulka22.png
10
https://96.46.99.183/tulka22.png
11
https://46.37.205.163/tulka22.png
12
https://77.109.46.161/tulka22.png
13
https://178.140.20.132/tulka22.png
14
https://96.46.100.49/tulka22.png
15
https://64.111.36.52/tulka22.png