Behavioral task
behavioral1
Sample
3d6d6bfc5ea6c02a7bcbba5af7df31e223ce6ce6559156334c3499ef0a7885bf.exe
Resource
win7-20240221-en
General
-
Target
3d6d6bfc5ea6c02a7bcbba5af7df31e223ce6ce6559156334c3499ef0a7885bf
-
Size
121KB
-
MD5
63dac6b8ad9a613588db62ca54f61d5b
-
SHA1
41cca2d53d4453a001e4b3ba3d4ffcf03e071deb
-
SHA256
3d6d6bfc5ea6c02a7bcbba5af7df31e223ce6ce6559156334c3499ef0a7885bf
-
SHA512
336454e3380db377544087051803f7b59a8b6c39abf1c18d1bd91b8044c8fb351ffbe8d564e9d8b8891ece99201b944ee43d089a3d59ee5304e9f7b21b842b83
-
SSDEEP
3072:9hOmTsF93UYfwC6GIoutz5yLpcka62c+8+dRN1j:9cm4FmowdHoSZ6lCX3
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3d6d6bfc5ea6c02a7bcbba5af7df31e223ce6ce6559156334c3499ef0a7885bf
Files
-
3d6d6bfc5ea6c02a7bcbba5af7df31e223ce6ce6559156334c3499ef0a7885bf.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE