Behavioral task
behavioral1
Sample
Soldatserver+1.0.1/soldatserver+
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral2
Sample
Soldatserver+1.0.1/soldatserver+.exe
Resource
win7-20231020-en
Behavioral task
behavioral3
Sample
Soldatserver+1.0.1/soldatserver+.exe
Resource
win10v2004-20231023-en
General
-
Target
4aae06e14c6a657a0fbecca6b831f2174b26846c006303d8d2b3f007ddfd1ccb.zip.zip
-
Size
721KB
-
MD5
902a030d44d6062eababeb6e4180136b
-
SHA1
116be72ae26851ec481913c927a8552e96580464
-
SHA256
e44acec255bcfdcdc389f683dc04033707736103e30d473f1636e19c69887d55
-
SHA512
9d8afd7c2143f82ca30ec78eaecbdebb65658ee5655e9c7694a3d956af68700f47ed3ec7190e7402862dd210ea1da27218984574adfd00e42140130ab2367629
-
SSDEEP
12288:MUZfVq8kKt9HfJ9nI/7sbYbrK6tHYZHEfFNtvC9J/MwbtTnZmjUjT85W3Dz:MUZVqUKjscXK6tWEvtA/M+tRT85W3P
Malware Config
Signatures
-
resource yara_rule static1/unpack002/Soldatserver+1.0.1/soldatserver+ upx static1/unpack002/Soldatserver+1.0.1/soldatserver+.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/Soldatserver+1.0.1/soldatserver+.exe
Files
-
4aae06e14c6a657a0fbecca6b831f2174b26846c006303d8d2b3f007ddfd1ccb.zip.zip.zip
Password: infected
-
4aae06e14c6a657a0fbecca6b831f2174b26846c006303d8d2b3f007ddfd1ccb.zip.zip
-
Soldatserver+1.0.1/readme.txt
-
Soldatserver+1.0.1/soldatserver+.elf linux x86
-
Soldatserver+1.0.1/soldatserver+.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 7.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 314KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE