Behavioral task
behavioral1
Sample
368acb5da3e3db13b409309c72faf01c28fc6b37b90f3dc092c47ab63e422010.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
368acb5da3e3db13b409309c72faf01c28fc6b37b90f3dc092c47ab63e422010.exe
Resource
win10v2004-20240419-en
General
-
Target
368acb5da3e3db13b409309c72faf01c28fc6b37b90f3dc092c47ab63e422010
-
Size
2.9MB
-
MD5
07b5a07106b7195700141a74b6b9d765
-
SHA1
74330b396e102b57497498cc6db61d712a349d09
-
SHA256
368acb5da3e3db13b409309c72faf01c28fc6b37b90f3dc092c47ab63e422010
-
SHA512
ddb095ab64f69d2b977cc876c6d256e9e91a9b484b9407d326ea258494c7a2a295610108f2cb810feb5bb1720deec521d26c36398843565f32326133603b50d9
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHj:ATU7AAmw4gxeOw46fUbNecCCFbNecS
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Warzone RAT payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 368acb5da3e3db13b409309c72faf01c28fc6b37b90f3dc092c47ab63e422010
Files
-
368acb5da3e3db13b409309c72faf01c28fc6b37b90f3dc092c47ab63e422010.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE