Behavioral task
behavioral1
Sample
c4028936203f5dd5bfc76b37bf06708efa191e7a6a20e7752c11e0969c850587.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4028936203f5dd5bfc76b37bf06708efa191e7a6a20e7752c11e0969c850587.exe
Resource
win10v2004-20220812-en
General
-
Target
c4028936203f5dd5bfc76b37bf06708efa191e7a6a20e7752c11e0969c850587
-
Size
1012KB
-
MD5
7225eec8035d348825d6e03d0f40daa9
-
SHA1
2afb776083290f447068f0fb595181a2ff82fb0e
-
SHA256
c4028936203f5dd5bfc76b37bf06708efa191e7a6a20e7752c11e0969c850587
-
SHA512
11be71d3f62923a635b3ac0bd3e098a060c5837f2503e0007b6ef9557e922c523c9c544350da6a6bece51a3a1c5fc36adaff25ccbb0bb9b932e04c357b0221cc
-
SSDEEP
12288:kum3NNhhsPoC7wYmHRCoLooVnIz+Q2Lyd5w7+3CoSO/FG0EmDT:d97fUps2efw7+3No0EI
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
c4028936203f5dd5bfc76b37bf06708efa191e7a6a20e7752c11e0969c850587.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 576KB - Virtual size: 576KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 241KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE