Behavioral task
behavioral1
Sample
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe
Resource
win10v2004-20240611-en
General
-
Target
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674
-
Size
70KB
-
MD5
bdf4fc15d73d750fb764b52da65d6ab4
-
SHA1
51aa0638430b6341498b65a877d1e0940064f1fc
-
SHA256
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674
-
SHA512
74b3c5f641b289236189bb38871c1e3962f70a172d1e52dedcf020fe8b843ca9f7ec3591726869fafa12745b61349c8b4807c46c3e6c00b26d9596efbf0d7a29
-
SSDEEP
1536:eclu3E0ty5RM6Esc4m6cq1ZebmaL4UnpCdsfV1YADir+6S:ju3NURAscOx7wpCKznz
Malware Config
Signatures
-
Detects win.dharma. 1 IoCs
resource yara_rule static1/unpack001/out.upx win_dharma_auto -
Identifies DHARMA ransomware 4 IoCs
resource yara_rule static1/unpack001/out.upx Windows_Ransomware_Dharma_aa5eefed static1/unpack001/out.upx Windows_Ransomware_Dharma_b31cac3f static1/unpack001/out.upx Windows_Ransomware_Dharma_e9319e4a static1/unpack001/out.upx Windows_Ransomware_Dharma_942142e3 -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674 unpack001/out.upx
Files
-
b1dd75efa7ba920522bd4bfe4a3e5d08138bfc548faff601206b0cc56c9bb674.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 68KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE