Behavioral task
behavioral1
Sample
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe
Resource
win10v2004-20220812-en
General
-
Target
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a
-
Size
83KB
-
MD5
845183a0d4affb939e6636378c5349d0
-
SHA1
0bc40ac0822f1ef9d0b7854e249b665002e2c445
-
SHA256
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a
-
SHA512
4b19f4832793019a8b34d44570e8a67eeacbeec53fb010570c6efc9906edee051dc4b26c25d9a88d3f3dcc707d4ed395a21cad507d9583722c860a25ebb9c07b
-
SSDEEP
1536:/UtQgxhV/KqRxH75mGOLHf9RtrTxLPQEAKVAPObClQdwDDgagR97ZzPcsrHStHfv:stQg5xxbgGOTjFb9gDkzPcsrWfC9E
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule sample patched_upx -
resource yara_rule sample upx
Files
-
931b40556a39a4bb1d2608a120f454687a2dc67c507647625ad6c105f880d70a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX1 Size: - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE