Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10-20230915-de
Behavioral task
behavioral2
Sample
main.pyc
Resource
win10-20230915-de
General
-
Target
Loader.exe
-
Size
81.0MB
-
MD5
157b41ce7e540bf79ef5c041d709e0b3
-
SHA1
f2735168b5ecef8db52a086b52d8d675c5645950
-
SHA256
0bbd8739b38dac925b15fdcfa9ed19ba8d9b07829121f68ba92852d15b5904a9
-
SHA512
9d4e6eea32b73f06f5bab4f5f91f24cd8710473653bb676424dc6bd60845a87b667e009ff1d8b069c992f82d2ba78ac617e3dc566a6822dc57e1da9225b50200
-
SSDEEP
1572864:0Qt6PBr27ZS1ril7h9rW1LrKiqm2T17nD0Cwu5Q/KZYlctoka4ArnjoPHGW:0dhEZSBM7h9QLfqmY1Di9SQctWTjoPGW
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Loader.exe
Files
-
Loader.exe.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 220KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
main.pyc