Behavioral task
behavioral1
Sample
VOID.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VOID.exe
Resource
win10v2004-20241007-en
General
-
Target
VOID.exe.zip
-
Size
12.7MB
-
MD5
46d0a6031c0f771b32e2b505e8d1a3f9
-
SHA1
b22c958ba417d721b807df78e9f98d2dff0b0247
-
SHA256
6cf02d69d8824c8516a97314bd3948a22b69a394f27774fad7561ba3a7ac2c9f
-
SHA512
e0bc0fb25289a0efb026b35a0dd6af735f72d944bd4625b1a236e8d81de947cc45dc80a7c303b86dbf4f0a85f67d5b6b964e37202d2d7a89b3aa422dac3b216d
-
SSDEEP
196608:oRNJ3xw0hvKjNY6yANtGkXOdMV84Rfd9+y7uq5pf4w5TFdu3mX3DgsDBorxuZLqZ:0JBTv7Aaxdv4Fd9+MDVFBqC3DDcudqZ
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/VOID.exe.bin upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/VOID.exe.bin
Files
-
VOID.exe.zip.zip
Password: infected
-
VOID.exe.bin.exe windows:5 windows x64 arch:x64
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 172KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 126KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Stub.pyc