Behavioral task
behavioral1
Sample
323fa2ae2b4ce565320f8c88137fdae046064beef634d687bdfb3d8f16c9c218.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
323fa2ae2b4ce565320f8c88137fdae046064beef634d687bdfb3d8f16c9c218.exe
Resource
win10v2004-20220901-en
General
-
Target
323fa2ae2b4ce565320f8c88137fdae046064beef634d687bdfb3d8f16c9c218
-
Size
624KB
-
MD5
912b99134dd6d2a6758ca0d7f7d0ba20
-
SHA1
a23991553e29aa8bce8314a7501922e90d24397e
-
SHA256
323fa2ae2b4ce565320f8c88137fdae046064beef634d687bdfb3d8f16c9c218
-
SHA512
0ef5e23fb642403ff4b73796f4a622da2f166084921000b918136fdbc656d868591029d2d8e21435d308a63ffffebf9b4ee30378f1442ec1e3e1b2f645ddec73
-
SSDEEP
12288:hgDhdkq5BCoC5LfWSLTUQpr2Zu19Q3Sxe:hgDhdkMRWfLTUO2Zu1u33
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
323fa2ae2b4ce565320f8c88137fdae046064beef634d687bdfb3d8f16c9c218.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 368KB - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 217KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE