Behavioral task
behavioral1
Sample
e8d83eaa9bca8b763325bbe2de73f4bf231db50b27367767777586eaeadca84d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8d83eaa9bca8b763325bbe2de73f4bf231db50b27367767777586eaeadca84d.exe
Resource
win10v2004-20220812-en
General
-
Target
e8d83eaa9bca8b763325bbe2de73f4bf231db50b27367767777586eaeadca84d
-
Size
1.4MB
-
MD5
600e0e46373c1bab4bed7770b671bc91
-
SHA1
25455bc5f08b6ad60ae61c8e233f88c0c80298b5
-
SHA256
e8d83eaa9bca8b763325bbe2de73f4bf231db50b27367767777586eaeadca84d
-
SHA512
e04a499bbd27b2c22ad6452c579560da9fbd4b9a98103bf388ce240ee7ca9fe7e5a975455a040cc3ae07af7be381d6c909b8e6ba9ade96631d0141233b5d025f
-
SSDEEP
12288:a6SKqT31T6WpJY6V765jKqostkm3tbFf1ETORx4zPY+6efM2cg+oCl:HxqT31T6WE6I5jKqosOm9bFfH4zgleU7
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
e8d83eaa9bca8b763325bbe2de73f4bf231db50b27367767777586eaeadca84d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 680KB - Virtual size: 680KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 267KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 374KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE