Behavioral task
behavioral1
Sample
31dcb10b00049f7814a3b23ad9a56fab484af97a169dc11716a1548ca7f4fb1d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
31dcb10b00049f7814a3b23ad9a56fab484af97a169dc11716a1548ca7f4fb1d.exe
Resource
win10v2004-20220812-en
General
-
Target
31dcb10b00049f7814a3b23ad9a56fab484af97a169dc11716a1548ca7f4fb1d
-
Size
609KB
-
MD5
0cc75f72597a135b6215a70ba899dd40
-
SHA1
2da6a9bf375d348588fa3eef703ce8631a8b734f
-
SHA256
31dcb10b00049f7814a3b23ad9a56fab484af97a169dc11716a1548ca7f4fb1d
-
SHA512
d7dcafda0fc32531ef52e415ca77e8788284193d32a65004cfd9a358096ce7c547038bfd6eecc5f844fdb737cd841a39bc3ff05e4c791b4b4dc9218cad871d5d
-
SSDEEP
12288:v6SKqT31T6WpJY6V765jKqostkm30bRUJwm:ixqT31T6WE6I5jKqosOmEbRG
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
31dcb10b00049f7814a3b23ad9a56fab484af97a169dc11716a1548ca7f4fb1d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE