Behavioral task
behavioral1
Sample
e8bc0d3cf8d0bf9b8aee4a13b520253780ec474a67817cfa8558b18d6a6287ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8bc0d3cf8d0bf9b8aee4a13b520253780ec474a67817cfa8558b18d6a6287ba.exe
Resource
win10v2004-20220812-en
General
-
Target
e8bc0d3cf8d0bf9b8aee4a13b520253780ec474a67817cfa8558b18d6a6287ba
-
Size
83KB
-
MD5
83f0fc4a8eb6a481af47575ea13311d8
-
SHA1
59b2f287a24a2ed518bce44702a7be3082ae7433
-
SHA256
e8bc0d3cf8d0bf9b8aee4a13b520253780ec474a67817cfa8558b18d6a6287ba
-
SHA512
842c51df236d27fcb18560c39be50196545c2c8130238cb5cd600b89a967cbf2e4907eeffc9a46a38584ad3ea5149beecde91e76cc0d763d4e953b42bc917096
-
SSDEEP
1536:/UtQgxhV/KqRxH75mGOLHf9RtrTxLPQEAKV2PObClQdwDDgagR97ZzPcsrHStHfv:stQg5xxbgGOTjFb92DkzPcsrWfC9E
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule sample patched_upx -
resource yara_rule sample upx
Files
-
e8bc0d3cf8d0bf9b8aee4a13b520253780ec474a67817cfa8558b18d6a6287ba.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX1 Size: - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE