Behavioral task
behavioral1
Sample
Backdoor.Win32.Plite.exe
Resource
win7-20240221-en
General
-
Target
Backdoor.Win32.Plite.bhty-53e2d9cf51d1002148232ed3baecbcc7d38042b813a80ff1dd49dbd4af6120fe
-
Size
425KB
-
MD5
3975eae09b24b158869457531064c675
-
SHA1
6168f616af1a7312ce9bb8dd0e9154f1d81e4c6f
-
SHA256
53e2d9cf51d1002148232ed3baecbcc7d38042b813a80ff1dd49dbd4af6120fe
-
SHA512
0671d05e2ccdd03dbd757bc10538495bf882aa26489c56230e7350a3991e3bb0007a37fa91e899dfdbe5b704d3e2ef09a71c826f9410f7520e70c0e799832a8d
-
SSDEEP
6144:y5SXvBoDWoyLYyzbpPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrBw/gqrMw:yIfBoDWoyFboU6hAJQnrMgqow
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Backdoor.Win32.Plite.bhty-53e2d9cf51d1002148232ed3baecbcc7d38042b813a80ff1dd49dbd4af6120fe
Files
-
Backdoor.Win32.Plite.bhty-53e2d9cf51d1002148232ed3baecbcc7d38042b813a80ff1dd49dbd4af6120fe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 225KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HJSDRTRW Size: 25KB - Virtual size: 28KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE