Behavioral task
behavioral1
Sample
ROBLOJ.exe
Resource
win7-20240704-en
General
-
Target
ROBLOJ.exe
-
Size
1.0MB
-
MD5
3e76feff4b59d8b104be9a7720d1a7ec
-
SHA1
94fcaccde5b90c951df736f1589376b7004d9fbc
-
SHA256
1fd6dd183483399229dec09d132cc529c980adc410693e3ca501e57eef56b8f3
-
SHA512
01633703461d8b1a5186be4c82c9ce64a4132935d1a0991c7dc72daeda505751a01b7e23bc95b9b5f5cd08f869727db4e4a8a0bb215d62ba5a1f3da5db93c976
-
SSDEEP
24576:ySOarS9W3bvZydJgNP6oTV/4RVph1Pdih840JaVh21ejh4USE:ySNyWrRLQHRhpT40JaVgej6USE
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ROBLOJ.exe
Files
-
ROBLOJ.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 907KB - Virtual size: 908KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 143KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE