Behavioral task
behavioral1
Sample
c15871560d940497f3b8e19b32e980dce829c6ba7a6b45c21e0fee613387a791.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c15871560d940497f3b8e19b32e980dce829c6ba7a6b45c21e0fee613387a791.exe
Resource
win10v2004-20220812-en
General
-
Target
c15871560d940497f3b8e19b32e980dce829c6ba7a6b45c21e0fee613387a791
-
Size
83KB
-
MD5
d06c582a64c5bdabaa44c9ee66c12ecf
-
SHA1
0b770b12d8cc85cc5b284fddd61ad69dca79ed94
-
SHA256
c15871560d940497f3b8e19b32e980dce829c6ba7a6b45c21e0fee613387a791
-
SHA512
e8f498639c84b16bdb0d38b383efd3092c1da2673855fa4731778679006f91b5f6f0d076245e6782a795da8260fd391a1ed6082594fe88884b5903c615b84058
-
SSDEEP
1536:/UtQgxhV/KqRxH75mGOLHf9RtrTxLPQEAKVsPObClQdwDDgagR97ZzPcsrHStHfv:stQg5xxbgGOTjFb98DkzPcsrWfC9E
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule sample patched_upx -
resource yara_rule sample upx
Files
-
c15871560d940497f3b8e19b32e980dce829c6ba7a6b45c21e0fee613387a791.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX1 Size: - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE