Behavioral task
behavioral1
Sample
Net-Worm.Win32.Blaster.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Net-Worm.Win32.Blaster.exe
Resource
win10v2004-20231215-en
General
-
Target
Net-Worm.Win32.Blaster.zip
-
Size
10KB
-
MD5
f10ea530ec1526aa355f888ee5b2d93e
-
SHA1
508832ea10e07d68c18718db31d229ec63f88090
-
SHA256
732eaf1666f80da947cbb8c0b9ded98855379727bb4437ccea3e1af54cd24cbc
-
SHA512
d19533266269045c319d4df6381c2b36b0a66b2316a942d0f4da69fa7c1ccce9ee2f1714d43d6aab51582ab6daa45d0cd87d07e10242a8352a19a8f5b63cf216
-
SSDEEP
192:2yAtQyl2LejvNoES1o/JkFahUA84sBOX8aifaJFZwQV72AcdwE2hIIV6wn57rM:2hjl2KjvNosJkSUA84syFJFZM2rKs6WK
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Net-Worm.Win32.Blaster.A upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Net-Worm.Win32.Blaster.A unpack002/out.upx unpack001/Net-Worm.Win32.Blaster.E
Files
-
Net-Worm.Win32.Blaster.zip.zip
-
Net-Worm.Win32.Blaster.A.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 316B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Net-Worm.Win32.Blaster.E.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
code Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
text Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE