Behavioral task
behavioral1
Sample
Trojan-Dropper.Win32.Dinwod.exe
Resource
win7-20240221-en
General
-
Target
Trojan-Dropper.Win32.Dinwod.acqn-8a7c9e233353e613fab79c62fab33b64f2be7db89892cba66c6dc82d05e6280e
-
Size
376KB
-
MD5
153638896559c866b60421d13c8253fe
-
SHA1
2a3640dce4071d16e0d55360c9a870b3818b7ec5
-
SHA256
8a7c9e233353e613fab79c62fab33b64f2be7db89892cba66c6dc82d05e6280e
-
SHA512
1da6eb7d715416e52973008367b96c4ef866c92cc06d0346fbdb0e220d3acd34022604d58b465a66f64fa48f4198d585003467f8b2674baabe46f738ecde9fec
-
SSDEEP
6144:Ocm4FmowdHoSsm4FIc1/cm4FmowdHoSsiNlcJcmHYC9/jvvfwL+TLPfSRcm4FVoi:w4wFHoSl4h4wFHoS24yTgL+zfu4/FHo6
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan-Dropper.Win32.Dinwod.acqn-8a7c9e233353e613fab79c62fab33b64f2be7db89892cba66c6dc82d05e6280e
Files
-
Trojan-Dropper.Win32.Dinwod.acqn-8a7c9e233353e613fab79c62fab33b64f2be7db89892cba66c6dc82d05e6280e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RGmXTXEe Size: 3KB - Virtual size: 2KB
BgVjthbB Size: 19KB - Virtual size: 18KB
LnmJfTDD Size: 10KB - Virtual size: 9KB
AcYsIVBF Size: 7KB - Virtual size: 7KB
zHbboKbp Size: 2KB - Virtual size: 1KB
LpfzgeIY Size: 1024B - Virtual size: 650B
meaQkxgH Size: 94KB - Virtual size: 93KB
cgImBWwe Size: 512B - Virtual size: 457B
JmoZPGDh Size: 92KB - Virtual size: 92KB
TTYrWeoQ Size: 51KB - Virtual size: 50KB