Behavioral task
behavioral1
Sample
PurppyRecoil.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
PurppyRecoil.exe
Resource
win10v2004-20231020-en
General
-
Target
PurppyRecoil.exe
-
Size
33.8MB
-
MD5
02b8d86b0c85a2165a2b52f449ee44fc
-
SHA1
63ca751ff3f98d1d719864019462bb44ddbbd29e
-
SHA256
25ca8c069f52042db77c41a8f30c4cb7417a0727403efe7d93aaa1ab07c6bb14
-
SHA512
0ab03500ccb21f9384223e8132a723366f471787b9029ab468a1f9b3124bb115cfbbccefa0051b3e17b823f94913ffbe960d48dee687bb7191c63817b30850a7
-
SSDEEP
786432:nd7/4wR0/pLWDTBayxn4XmvMiakNDj3qzAxhmJ1Uc:Q1WDDn4X4MiaATqGhmvP
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule sample agile_net -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PurppyRecoil.exe
Files
-
PurppyRecoil.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
m14;rj9 Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 25.9MB - Virtual size: 25.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 7.7MB - Virtual size: 7.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IdFL Size: 512B - Virtual size: 134B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.null Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
<ضؼؼ� Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ