Behavioral task
behavioral1
Sample
2ecd7124039ca128235de1600064cde7b8481b7223d74e97b6ff019772dcb4ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ecd7124039ca128235de1600064cde7b8481b7223d74e97b6ff019772dcb4ac.exe
Resource
win10v2004-20220812-en
General
-
Target
2ecd7124039ca128235de1600064cde7b8481b7223d74e97b6ff019772dcb4ac
-
Size
592KB
-
MD5
9b960d3555a922b74a6f8cbc3ed777a2
-
SHA1
87d139a5bd8aa290292113a9ef3d40083793f899
-
SHA256
2ecd7124039ca128235de1600064cde7b8481b7223d74e97b6ff019772dcb4ac
-
SHA512
2b12bd256da2af86f14d6bfff5da489632758e3824f09173e1d185230ec03138dc4e52c004c03ce0ccab67a436ab29657512baf69321a9bab80aef3695490303
-
SSDEEP
6144:XcOp9GYAGwb0IVHOLXZcv5fSGxQ+qtJB8TwND7GbG2+k3isJ97sbl6lJdQ+Kj:Xc2rM0IVucv5/qtXxybG2+kSSCbl6lJs
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
2ecd7124039ca128235de1600064cde7b8481b7223d74e97b6ff019772dcb4ac.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 340KB - Virtual size: 340KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 220KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE