Behavioral task
behavioral1
Sample
f31740266a38ce44685738775abfe5d6571dfb77678125906c2dc80d5f351bf2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f31740266a38ce44685738775abfe5d6571dfb77678125906c2dc80d5f351bf2.exe
Resource
win10v2004-20221111-en
General
-
Target
f31740266a38ce44685738775abfe5d6571dfb77678125906c2dc80d5f351bf2
-
Size
2.3MB
-
MD5
4474536cbd5e85d7cd8ef4bf484cd41b
-
SHA1
78de49356cabcc1204340e44094bf1e18e4d5860
-
SHA256
f31740266a38ce44685738775abfe5d6571dfb77678125906c2dc80d5f351bf2
-
SHA512
df3304c4c9d3347358e81c1a2842b8b0cb255fc578c2f92e3d9987c517b5fb9c2acac8b1905448a8dd3fc27a2866d56027faba39bfb84afe30fa433a86eedb6d
-
SSDEEP
49152:S6WE6IN95kbM8mcSvSPntIX3c8f3c8K3c8SRW:S67XlxSPtInpEIc
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
f31740266a38ce44685738775abfe5d6571dfb77678125906c2dc80d5f351bf2.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 388KB - Virtual size: 388KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE