Behavioral task
behavioral1
Sample
77a76e2a322f7f577d1076b2416eb3e5fab83aad8a576fb7587105f835efe973.exe
Resource
win7-20231129-en
General
-
Target
77a76e2a322f7f577d1076b2416eb3e5fab83aad8a576fb7587105f835efe973
-
Size
119KB
-
MD5
2d3be421cf2d3341c0819c8d7dc17b10
-
SHA1
41a5ab89fb404d7df79e7d4998a0a4e24d0a5cb8
-
SHA256
77a76e2a322f7f577d1076b2416eb3e5fab83aad8a576fb7587105f835efe973
-
SHA512
2d5ccac191959c3785b08fc28184078f1322c92925f25f40ac3db70ef886af299de6d86c0714bbf7161cf3422d346f5e862dd3cffb8ee114ddf4056c0178ad13
-
SSDEEP
1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZznOeibgX7H:3dseIOMEZEyFjEOFqTiQmxnOeV7H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77a76e2a322f7f577d1076b2416eb3e5fab83aad8a576fb7587105f835efe973
Files
-
77a76e2a322f7f577d1076b2416eb3e5fab83aad8a576fb7587105f835efe973.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 64KB - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE