Behavioral task
behavioral1
Sample
2024-02-14_c8f20bd48d88179a9c02ff51114b4868_magniber_zxxz.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-14_c8f20bd48d88179a9c02ff51114b4868_magniber_zxxz.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_c8f20bd48d88179a9c02ff51114b4868_magniber_zxxz
-
Size
22.2MB
-
MD5
c8f20bd48d88179a9c02ff51114b4868
-
SHA1
33aff27f09b71e8e9c3569147413dd0db0fdecfe
-
SHA256
a87abf047ec6ca743404492451faae78d1ed106965b99998cb8174edddf27c5d
-
SHA512
b7b92d0e7c41dd5adf7ef4c43acbd1708681dc157faeb5e6282c541623f02b11a70d1340bf187dea19c383685fa9ea3b485cb728fca9bae5f4804aec714af12a
-
SSDEEP
196608:pEcHytTgW0Qq29vZpWHPycIv8F/asqsh94blUqQdKfKLyN7N7gogy:pEldnpEMs/+Uqc
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-14_c8f20bd48d88179a9c02ff51114b4868_magniber_zxxz
Files
-
2024-02-14_c8f20bd48d88179a9c02ff51114b4868_magniber_zxxz.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 14.7MB - Virtual size: 14.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7.3MB - Virtual size: 7.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 72KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE