Behavioral task
behavioral1
Sample
c4e4b973927b5dcc68f6b3e4fe201d6ca20ecd2e3e2b226ab55077333b53f1cd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4e4b973927b5dcc68f6b3e4fe201d6ca20ecd2e3e2b226ab55077333b53f1cd.exe
Resource
win10v2004-20221111-en
General
-
Target
c4e4b973927b5dcc68f6b3e4fe201d6ca20ecd2e3e2b226ab55077333b53f1cd
-
Size
1020KB
-
MD5
23103ac32fe6861c6892e60cad2c5690
-
SHA1
8d6463e32e7fd46e47238a301c5aa87ca1531d53
-
SHA256
c4e4b973927b5dcc68f6b3e4fe201d6ca20ecd2e3e2b226ab55077333b53f1cd
-
SHA512
045a7c07330faacd72a8da465102b7abfd6d45e54bc556bbbfb164bf02edf5409950d14a56ec2023e35b1dcb934c2b47721ffedb43e0bcf63fd77297d6e4a27a
-
SSDEEP
12288:2aWzgMg7v3qnCiMErQohh0F4CCJ8lnyR3mDMHRH0IkEEJBPo7IAyUEX03:RaHMv6CorjqnyR3mDMxKEEJ+7IAlEC
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe
Files
-
c4e4b973927b5dcc68f6b3e4fe201d6ca20ecd2e3e2b226ab55077333b53f1cd.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 440KB - Virtual size: 440KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 261KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE