Behavioral task
behavioral1
Sample
VOID.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VOID.exe
Resource
win10v2004-20241007-en
General
-
Target
VOID.exe.bin
-
Size
12.8MB
-
MD5
51b6d27a87f2da883dfffa46b3e759de
-
SHA1
aad6fac75497883d9ed1a7273625599c0817f42b
-
SHA256
39d2e86859ea01a5586dd29cdc4a7a66810dd203814043822a0fc41bce390df9
-
SHA512
bbc8c7663a4654c71de9e95891955460dcc097f4840787645268859ceccec3a00a38fa0ec105ab894285f64fcc2f5c6bdfba458e8633c6bc64c0848d264b34d1
-
SSDEEP
393216:CQdq/L01+l+uq+Vv2dQJlewF3MnG3xlCOOBsnarIWeRaDH:Cq+01+l+uqgv2dQT3MGqO2GVRq
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VOID.exe.bin
Files
-
VOID.exe.bin.exe windows:5 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 172KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 126KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Stub.pyc