Behavioral task
behavioral1
Sample
20dcc9efa48b88d7f473a7fa2652b755.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20dcc9efa48b88d7f473a7fa2652b755.exe
Resource
win10v2004-20231215-en
General
-
Target
20dcc9efa48b88d7f473a7fa2652b755
-
Size
927KB
-
MD5
20dcc9efa48b88d7f473a7fa2652b755
-
SHA1
a6efc8ea487daefcff55a3f090a604399ef586a8
-
SHA256
6f5d4f07cadf99509777b5ad03ce0877b6e57042a82adbef30f4fef7408c0fbd
-
SHA512
29cc9da071bb1e5e68981f0ee71fe473c545190c116412c247dad2a187f37e155bec5a7f6de080c01a17617d5f420c7edddb40a096114121e4c674b9a36fb67f
-
SSDEEP
12288:D6SKqT31T6WpJY6V765jKqostkm3Bbc1nyVPdDDVk4eZ5KrJ:2xqT31T6WE6I5jKqosOmxbcB2Fu4mKd
Malware Config
Signatures
-
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20dcc9efa48b88d7f473a7fa2652b755
Files
-
20dcc9efa48b88d7f473a7fa2652b755.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 408KB - Virtual size: 408KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 285KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE