Behavioral task
behavioral1
Sample
4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64.exe
Resource
win10v2004-20240508-en
General
-
Target
4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64.zip
-
Size
3.2MB
-
MD5
5d590b628108d225ef8e67107ab382b4
-
SHA1
0925ccfdac1d87880b1dfd51c68b2c2d439aebc3
-
SHA256
c583b6e55320e37eb1b4eb130ba4c52c0a487f788607f85526a73d58d84c4e27
-
SHA512
c0ca6685ee28a4f5d1f34c1e7d5c58b8e2048687503d2a1dfd9fde196cf0d36a1e5eb1d2c92b4db465300b7e4661b31ef5b1012c7ba9f13845ed11fa61bdf728
-
SSDEEP
98304:ORp7aop6fgRIEJWhBeQz6o7+eXeEKAxvJOUngP:a7aop6fEWWaXpXhOUgP
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule static1/unpack001/4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64 patched_upx -
resource yara_rule static1/unpack001/4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64 upx -
Detect suspicious telegram bot 1 IoCs
Detect suspicious telegram bot.
resource yara_rule static1/unpack001/4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64 suspicious_telegram_bot -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64
Files
-
4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64.zip.zip
Password: infected
-
4129aaa0e0eb456ae4584b8450b7a366ca7112777313eb72be85648245e60c64.exe windows:6 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE