Behavioral task
behavioral1
Sample
MspFet.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MspFet.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
MspFetCon.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
MspFetCon.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
WinIo.sys
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
WinIo.sys
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
EXE/BSLDEMO.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
EXE/BSLDEMO.exe
Resource
win10v2004-20230915-en
General
-
Target
dd35ff43c3c211d850d06073550ad2cf62d75af18e34397c5c0471e97cd5e96b.zip.zip
-
Size
295KB
-
MD5
ae1e4b01bcebce0901729001e594d8fe
-
SHA1
53a9982ec20a8e25885e3d42bf351c1a90346a56
-
SHA256
5525e4ad60237f50e33d14ad2b6df6b1b148740f7e250260f3adbddaefbcf932
-
SHA512
8ac5288725d22abb9c6459471cdfa96bae4c7e7c061a8f4cb18fdb1a8a27cc49fb2419996b1ec339993fb921c32456e6041fbf2b1ff5a50ae1ea91b35789605f
-
SSDEEP
6144:1vwu8wWg0qKpFf1f4MWRxCNDqq6/bSrA6fIiV5SVirYtD8n:1ZXAVph1f4MQ9+NfIcUirYVo
Malware Config
Signatures
-
resource yara_rule static1/unpack003/MspFet.exe upx static1/unpack003/MspFetCon.exe upx -
Unsigned PE 6 IoCs
Checks for missing Authenticode signature.
resource unpack003/MspFet.exe unpack004/out.upx unpack003/MspFetCon.exe unpack005/out.upx unpack003/WinIo.sys unpack006/EXE/BSLDEMO.EXE
Files
-
dd35ff43c3c211d850d06073550ad2cf62d75af18e34397c5c0471e97cd5e96b.zip.zip.zip
Password: infected
-
dd35ff43c3c211d850d06073550ad2cf62d75af18e34397c5c0471e97cd5e96b.zip.zip
-
mspfet_161014.zip.zip
-
MspFet.exe.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
MspFetCon.exe.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
WINIO.VXD
-
WinIo.sys.sys windows:4 windows x86
172b54da983eaa27abf08d8ed525b840
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
MmAllocateNonCachedMemory
MmFreeNonCachedMemory
Ke386SetIoAccessMap
IoCreateSymbolicLink
IofCompleteRequest
Ke386IoSetAccessProcess
IoDeleteSymbolicLink
ZwClose
ZwMapViewOfSection
ObReferenceObjectByHandle
ZwOpenSection
ZwUnmapViewOfSection
IoDeleteDevice
IoGetCurrentProcess
hal
HalTranslateBusAddress
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 536B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
changelog.txt
-
readme.txt
-
slaa096b.zip.zip
-
EXE/BL_130V.TXT
-
EXE/BSLDEMO.EXE.exe windows:4 windows x86
cb5eff3fee8fa73a73a7c4e8a100a774
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
PurgeComm
WriteFile
ReadFile
GetTickCount
Sleep
ClearCommError
CloseHandle
GetCommState
SetCommMask
SetCommTimeouts
GetCommTimeouts
SetupComm
CreateFileA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapAlloc
TerminateProcess
SetCommState
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
SetStdHandle
FlushFileBuffers
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetProcAddress
LoadLibraryA
SetEndOfFile
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
EXE/PATCH.TXT
-
EXE/int_vect.txt
-
EXE/test.txt
-
SOURCE/BSLDEMO.DSP
-
SOURCE/BSLDEMO.DSW
-
SOURCE/bslcomm.c
-
SOURCE/bslcomm.h
-
SOURCE/bsldemo.c
-
SOURCE/ssp.c
-
SOURCE/ssp.h
-
readme.txt
-
slaa096d.zip.zip