Behavioral task
behavioral1
Sample
Servidor [TecnoHack].exe
Resource
win7-20230712-es
General
-
Target
Servidor [TecnoHack].exe
-
Size
420KB
-
MD5
b8ca6a24abb8d86569eac23d16f50400
-
SHA1
0507162b2c4cbb0897e536936919849e48cf1231
-
SHA256
935222956dbc43b0be39f98ae9e85924ef7ca15cf5bbeacd0a59db5760542926
-
SHA512
0b229d295cdad23e8c050e38a329dc477819a0ad1967c958e47b6183510083c1fb9faf0b87f016ea088042ebc116c8fca93b2e53d210c94693436c3bdfdf6213
-
SSDEEP
12288:Qkw6VLOrPw0a/s8+2YnRR6NvQVr74D6AxAIG+nQWi4PGP3JF:73LOrPor+28iNvQyFbnFi4eP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Servidor [TecnoHack].exe
Files
-
Servidor [TecnoHack].exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 380KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 406KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE