Behavioral task
behavioral1
Sample
c36b66fdb4ff8bc0bf0651dd56b19ef0N.exe
Resource
win7-20240704-en
General
-
Target
c36b66fdb4ff8bc0bf0651dd56b19ef0N.exe
-
Size
51KB
-
MD5
c36b66fdb4ff8bc0bf0651dd56b19ef0
-
SHA1
7d71c023088466160bb1936d8bb6e7548854106f
-
SHA256
436885c7dc879a36015ba8ea21e92b7b68b319576c2477debb5d21aa79ec6222
-
SHA512
a068f153e1252bbe686104311621d05b1ad5f7503f346180cd5df8364c8fade388bb05367b749fc86da79f489b1b29512b5be4c14c4c30e3a44d620ed4f376c3
-
SSDEEP
768:4Y6MYKJnGs3bcJPyO2dqhIPDiiJElp+jV9rmltavrb/yWIl9kH11:4YJ7Jx4f2AGWUj/rmltaTGPQ11
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
Files
-
c36b66fdb4ff8bc0bf0651dd56b19ef0N.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE