Behavioral task
behavioral1
Sample
Runtime Raid Reconstructor 4.03 [vokeon]/brd/Keygen.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Runtime Raid Reconstructor 4.03 [vokeon]/brd/Keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Runtime Raid Reconstructor 4.03 [vokeon]/raidsetup.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Runtime Raid Reconstructor 4.03 [vokeon]/raidsetup.exe
Resource
win10v2004-20231222-en
General
-
Target
fe006c11f6b9b4e0e96205b7b52b2425
-
Size
2.6MB
-
MD5
fe006c11f6b9b4e0e96205b7b52b2425
-
SHA1
6929284aba0f0c86829cec78b713999da4008a45
-
SHA256
37a667a8d0cf6db122387e0856bb2b30bbc9c9ed95f10a5ed64cfdab3366396c
-
SHA512
e1d6f389e43b6152aee5b005df4fce2a41f4d9092589a2fb4bf49ceaa258f057b852ff653413003ea7e5cd0fcb8ee4e4fa33f83a5834a8a6a66ef9ba4b76e804
-
SSDEEP
49152:jlw6/1SA6EAe0dt1dp58cGkNgnWRUBeNCqMvGkOla0heecUTuSsA3wS6mP:1hzleBn8cGkinZBeIPPOZT5h3wS6mP
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Runtime Raid Reconstructor 4.03 [vokeon]/brd/Keygen.exe upx static1/unpack001/Runtime Raid Reconstructor 4.03 [vokeon]/raidsetup.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Runtime Raid Reconstructor 4.03 [vokeon]/brd/Keygen.exe unpack002/out.upx unpack001/Runtime Raid Reconstructor 4.03 [vokeon]/raidsetup.exe
Files
-
fe006c11f6b9b4e0e96205b7b52b2425.rar
-
Runtime Raid Reconstructor 4.03 [vokeon]/brd/Keygen.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 316KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 203KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Runtime Raid Reconstructor 4.03 [vokeon]/brd/brd.nfo
-
Runtime Raid Reconstructor 4.03 [vokeon]/raidsetup.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 272KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE