Behavioral task
behavioral1
Sample
06cd96967177b625bcf97ed8a729ceb1d2309cc025e158d3c7828ee154f03d5a.exe
Resource
win7-20240705-en
General
-
Target
06cd96967177b625bcf97ed8a729ceb1d2309cc025e158d3c7828ee154f03d5a
-
Size
51KB
-
MD5
7698d6a2aa3652306645cdbe48958e3f
-
SHA1
66b3ee4fc8d2053aa365c742eda33f559952c164
-
SHA256
06cd96967177b625bcf97ed8a729ceb1d2309cc025e158d3c7828ee154f03d5a
-
SHA512
41e05a1aab19aeb79ed0d87fde31b23f05fb052b4f76f8c7756580d909450c6c63cdfae5b7a4f37bf3ee537fc31368deca048b663c108a65965e9997a6f50c0a
-
SSDEEP
768:IY6MYKJnGs3bcJPyO2dqhIPDiiJElp+jV9rmltavrb/yWIl9kH11:IYJ7Jx4f2AGWUj/rmltaTGPQ11
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 06cd96967177b625bcf97ed8a729ceb1d2309cc025e158d3c7828ee154f03d5a unpack001/out.upx
Files
-
06cd96967177b625bcf97ed8a729ceb1d2309cc025e158d3c7828ee154f03d5a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE