Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
WD Fucker/dControl.exe
Resource
win11-20240709-en
Target
WD Fucker.zip
Size
447KB
MD5
119cf9dc8de1b19d8bfd906048c4553c
SHA1
a11218102a62f1f9515fbd514f5c7e348c6702e4
SHA256
92551d050e53e336ec827ef97e989d53c021b6f2b68e736207789f6383991d65
SHA512
11c48f2993eb3b5a2472a15fbcb8b68b54eec592c7e6cf767afb71e790f841bdaa581519032db7a0e88025b6ac23208a17d8293706a5b28404289700fd38f74c
SSDEEP
12288:UzoljnMjhdmYkCRo2gfLc4G4rsNncix51tvtJLGY:I+Mddk2gTc4GRcE51h+Y
resource | yara_rule |
---|---|
static1/unpack001/WD Fucker/dControl.exe | upx |
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | autoit_exe |
Checks for missing Authenticode signature.
resource |
---|
unpack002/out.upx |
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ