Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Win32.Tiggre.plock.26119.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Win32.Tiggre.plock.26119.exe
Resource
win10v2004-20230220-en
General
-
Target
SecuriteInfo.com.Trojan.Win32.Tiggre.plock.26119.12570
-
Size
13KB
-
MD5
4183ed2bd2e42d00409e266f4cc2d3dc
-
SHA1
b9a9fa6e71bb03ee6b7b8fa8fe26ed16b0ba4796
-
SHA256
ae874fdfc509c800b8546888b0777ed37b34bd70ad10942b40e88f72cef6aaf8
-
SHA512
07f4b41196dee27802be4c582a313b370c441a260d4224f04c06a4ee425044d27f37bea8bb524fd475c01e01b44d3c30aeeff52f08243174461e71b92609936f
-
SSDEEP
192:jibYcA3o6kL5hcsWm1PnUYdcIRuUPPUjePTkPtDICvebT7q9:OMcAY6kLzcsWgURIwU37ODZv2TO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Trojan.Win32.Tiggre.plock.26119.12570 unpack001/out.upx
Files
-
SecuriteInfo.com.Trojan.Win32.Tiggre.plock.26119.12570.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ