Behavioral task
behavioral1
Sample
a68380ab243eaea509cbabae939cce98a92472ade9a3db699d19de0c15af77fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a68380ab243eaea509cbabae939cce98a92472ade9a3db699d19de0c15af77fb.exe
Resource
win10v2004-20220901-en
General
-
Target
a68380ab243eaea509cbabae939cce98a92472ade9a3db699d19de0c15af77fb
-
Size
789KB
-
MD5
96a57b0528c3f502a91ee3851d8f1639
-
SHA1
6254d7e5d05658f662f148418db2deb366cdbd29
-
SHA256
a68380ab243eaea509cbabae939cce98a92472ade9a3db699d19de0c15af77fb
-
SHA512
835737d33e09ffef0b0b9f4d5f39c8d22031a6d5e75a4965f784eb3f96f8ae13d2d4723fbf6b9f821a07a822b960c2fa517d7037e15031b5b5d112b1cef272ef
-
SSDEEP
12288:U6SKqT31T6WpJY6V765jKqostkm3EbRhwDFCnCln6y3ZFw:FxqT31T6WE6I5jKqosOm0b7yT3Xw
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
a68380ab243eaea509cbabae939cce98a92472ade9a3db699d19de0c15af77fb.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 267KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE