Behavioral task
behavioral1
Sample
003a6dd1a889b2a04e18dd0ea94019d70de8553a5b9e97b62cb12757ea11b1d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
003a6dd1a889b2a04e18dd0ea94019d70de8553a5b9e97b62cb12757ea11b1d7.exe
Resource
win10v2004-20220901-en
General
-
Target
003a6dd1a889b2a04e18dd0ea94019d70de8553a5b9e97b62cb12757ea11b1d7
-
Size
992KB
-
MD5
82600465c5b778740f7c971197da8d20
-
SHA1
0fe8131119ccf430015e2c9319929adc98a22864
-
SHA256
003a6dd1a889b2a04e18dd0ea94019d70de8553a5b9e97b62cb12757ea11b1d7
-
SHA512
c9d4cd31aa291ef80c3008c52d04590498ce5640bc898d8666d12d8f6de18239a54b3707a6d2fc1af89591e09fb799ff73ce57bcbcdb0ddf9a1a7f207f65ab27
-
SSDEEP
24576:PxqT31T6WE6I5jKqosOmkbMQmZSwTreEVOCOZo8OUa/VmAP:S6WE6IN95kbMQmEwTre/Do8OUatr
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
003a6dd1a889b2a04e18dd0ea94019d70de8553a5b9e97b62cb12757ea11b1d7.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 388KB - Virtual size: 388KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE