Behavioral task
behavioral1
Sample
c46b8c28247a27b75d514c0218dc70ba5396f2ffa2440f9c39ccef3f38a24a59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c46b8c28247a27b75d514c0218dc70ba5396f2ffa2440f9c39ccef3f38a24a59.exe
Resource
win10v2004-20220901-en
General
-
Target
c46b8c28247a27b75d514c0218dc70ba5396f2ffa2440f9c39ccef3f38a24a59
-
Size
224KB
-
MD5
d30a00875454d2950efe07c29d7264c6
-
SHA1
34a112eff80b0ea63cbbae64d8b761c58a48e411
-
SHA256
c46b8c28247a27b75d514c0218dc70ba5396f2ffa2440f9c39ccef3f38a24a59
-
SHA512
879c81730c725f0b036582e9ff7be8015dadae2c6f863a47506f637269c5394ad15d387f2b709282022f500d3b3613fb16157512fb70ea683d33e87c84bb7815
-
SSDEEP
3072:Gf4LcwqJOq3XSiHoS/injJla4pxOXm7YnlTh:GfBwqJRHJKjJlTAXm7Yn/
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule sample patched_upx -
resource yara_rule sample upx
Files
-
c46b8c28247a27b75d514c0218dc70ba5396f2ffa2440f9c39ccef3f38a24a59.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE