Behavioral task
behavioral1
Sample
3edb99aa5bd64fbf25607c90a5671ad783aadb2f9bc1b79243471f832e062d75.exe
Resource
win7-20240903-en
General
-
Target
3edb99aa5bd64fbf25607c90a5671ad783aadb2f9bc1b79243471f832e062d75
-
Size
316KB
-
MD5
237eb56b83ea115cb9c1ed24743d1f4f
-
SHA1
cf7bd5c81e78d6365126e5d270cf9405ce9e579c
-
SHA256
3edb99aa5bd64fbf25607c90a5671ad783aadb2f9bc1b79243471f832e062d75
-
SHA512
06518dc6da92631f622141c061dde8fb54cbbc191d1fe866330b60683efdb543fb74cb63c9d9d4d5837f4c36c897e2ef79af23054380591b67a5042ecba90de5
-
SSDEEP
1536:w4d9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZUnOHBRzU:wIdseIO+EZEyFjEOFqTiQmKnOHjzU
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3edb99aa5bd64fbf25607c90a5671ad783aadb2f9bc1b79243471f832e062d75
Files
-
3edb99aa5bd64fbf25607c90a5671ad783aadb2f9bc1b79243471f832e062d75.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE