Behavioral task
behavioral1
Sample
d4fb7404b66449d68d1346c76f9a767b8fcffdf39bef006f441cb64890c33d65.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4fb7404b66449d68d1346c76f9a767b8fcffdf39bef006f441cb64890c33d65.exe
Resource
win10v2004-20221111-en
General
-
Target
d4fb7404b66449d68d1346c76f9a767b8fcffdf39bef006f441cb64890c33d65
-
Size
697KB
-
MD5
919829f32016c747eb1198573e23018c
-
SHA1
95cb08d21fbb86b642f3bb85a7e7884073c60a57
-
SHA256
d4fb7404b66449d68d1346c76f9a767b8fcffdf39bef006f441cb64890c33d65
-
SHA512
d04319401729313cde59340d145b20231fa4e350800754a7652a19e9922f2825c5993b26a5566dc672f5cd3a654f390f158a5318920caea2559276daad908fed
-
SSDEEP
6144:qpqoa8aLiC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcC5BlF:qpqiC/2OGAtkCP4cejGSOpRKA0GDl
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
d4fb7404b66449d68d1346c76f9a767b8fcffdf39bef006f441cb64890c33d65.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 420KB - Virtual size: 420KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 256KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE