Behavioral task
behavioral1
Sample
628-121-0x0000000000400000-0x0000000000753000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
628-121-0x0000000000400000-0x0000000000753000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
628-121-0x0000000000400000-0x0000000000753000-memory.dmp
-
Size
3.3MB
-
MD5
e585acb35f582737f46007439084e54e
-
SHA1
63fafc03e12077cd528d156e17642eeac771c9c2
-
SHA256
2e1b3b192cdb7505f789ec19eb79394901334852e030d169f3c2c1b2c9767c97
-
SHA512
95e3f8da69e6b42f4e538d74526825350c8f29432a289f92be157fd060bfde5a0ac4716fcc900d55efac0d1e835503c8a43fb44187f88eee2f33de503e95cc2f
-
SSDEEP
49152:p7nUNXDTerih1ZCS3i1Jdf5k6N21D5MAhtla2Svk6k1tw:pTozTMmYS3m4SAw
Malware Config
Extracted
aurora
94.142.138.50:8081
Signatures
-
Aurora family
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
Processes:
resource yara_rule sample patched_upx -
Processes:
resource yara_rule sample upx
Files
-
628-121-0x0000000000400000-0x0000000000753000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 2.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE