Behavioral task
behavioral1
Sample
48b58038c92b75a06b0466144b54c53f69ee6ece432582eb4d4e7eb382df9be0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48b58038c92b75a06b0466144b54c53f69ee6ece432582eb4d4e7eb382df9be0.exe
Resource
win10v2004-20240508-en
General
-
Target
48b58038c92b75a06b0466144b54c53f69ee6ece432582eb4d4e7eb382df9be0
-
Size
294KB
-
MD5
1d97deefc72655456006ee7181bbc6e0
-
SHA1
8e1a1201d7438bc01690d2a7cb5ab9b2f578849e
-
SHA256
48b58038c92b75a06b0466144b54c53f69ee6ece432582eb4d4e7eb382df9be0
-
SHA512
048296596b958c9446b426b0d5eaed0b6e5dd017f4cf0e1081507d9df9a8b88d258228693dc448b292f7e5b216f1eee82dcea7f68ce8400b19dd75b9b74de4ac
-
SSDEEP
3072:C64TRnltulOuQuT1XwyVXz5+MLZFOGsLo3JEg+I:oTpezssLsLiqI
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48b58038c92b75a06b0466144b54c53f69ee6ece432582eb4d4e7eb382df9be0
Files
-
48b58038c92b75a06b0466144b54c53f69ee6ece432582eb4d4e7eb382df9be0.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 472KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 264KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE