Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Aura.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Aura.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Aura.acc-a5bbc980f59874cfd03e706e7f5d801b970cc932ef102b2de4a88b51558c0483
-
Size
251KB
-
MD5
d473f19a1d299f05f8c0cb975f5f93f1
-
SHA1
03a81b82d36c0dc576a40766fd4e571be8fbf329
-
SHA256
a5bbc980f59874cfd03e706e7f5d801b970cc932ef102b2de4a88b51558c0483
-
SHA512
fe80c86106fdae8fdde7b57b667eb753b082f94fce8671ea8e2dc569cfc64bce709e81d0001e8891f96a93b3ca49351279c491d84c27bed4eae3aff5f4a92ec7
-
SSDEEP
3072:PILrWicg8qZanqMcm2qzTMGjUMOluqfUXtaEbVHRBJTp0n6j2KVHX9JAH9dsBhVa:5lqPqzTMGxOZfUlb7fTp06aMNi3Mc
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
Trojan-Ransom.Win32.Aura.acc-a5bbc980f59874cfd03e706e7f5d801b970cc932ef102b2de4a88b51558c0483.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 179KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE