Behavioral task
behavioral1
Sample
d919c2b8f47527ec5cd244264ad908d4a459e2d21b782ee36a65b830aae6e741.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d919c2b8f47527ec5cd244264ad908d4a459e2d21b782ee36a65b830aae6e741.exe
Resource
win10v2004-20220812-en
General
-
Target
d919c2b8f47527ec5cd244264ad908d4a459e2d21b782ee36a65b830aae6e741
-
Size
720KB
-
MD5
4dd4bcee1ca6b5915b53358f884b6760
-
SHA1
359ed3183b4fd3d9d11a7421180f45786ecd23bc
-
SHA256
d919c2b8f47527ec5cd244264ad908d4a459e2d21b782ee36a65b830aae6e741
-
SHA512
7017f55f8dbe28140346c44ac50c72d8a8c255116f128b3549113d9d921ee14e083dad141c129f2a29d19a729d2f5e67c740441fe96b677cd7f18b6f9ad3cdfc
-
SSDEEP
12288:YhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcmoLdL:ARmJkcoQricOIQxiZY1JoLdL
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
d919c2b8f47527ec5cd244264ad908d4a459e2d21b782ee36a65b830aae6e741.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 448KB - Virtual size: 448KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 264KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE