Behavioral task
behavioral1
Sample
0d6d0499c848c94d7e5296601be828d1a0e067a1c285497e70e2bff0da969702.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0d6d0499c848c94d7e5296601be828d1a0e067a1c285497e70e2bff0da969702.exe
Resource
win10v2004-20230220-en
General
-
Target
0d6d0499c848c94d7e5296601be828d1a0e067a1c285497e70e2bff0da969702
-
Size
7.7MB
-
MD5
3d44c99f43e29acd5de8a1120a58b9d9
-
SHA1
e36a601082a96309d9c1f4c02a54c543cfc419eb
-
SHA256
0d6d0499c848c94d7e5296601be828d1a0e067a1c285497e70e2bff0da969702
-
SHA512
fa54e99cf62e57f9e6e2dd297b7ef2f4ced15a5dfb1028a601bb37ebccdf0cad0d01700126528d4a748af614abb96cbfea0fe37bf15856995e56c552cd6bfea1
-
SSDEEP
196608:GUhON0bubA/QjD0JxawMl9yNQKJSHqfQaMvC3uVfStJTrzuT1i:7I+bEEQjD8QiSH5/vC3uNgXzei
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 0d6d0499c848c94d7e5296601be828d1a0e067a1c285497e70e2bff0da969702 unpack001/out.upx
Files
-
0d6d0499c848c94d7e5296601be828d1a0e067a1c285497e70e2bff0da969702.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ