Behavioral task
behavioral1
Sample
8f1eb48698fc03db9deb9b132e6efa69d5a75487b8c9bc50615e9b42e2281168.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8f1eb48698fc03db9deb9b132e6efa69d5a75487b8c9bc50615e9b42e2281168.exe
Resource
win10v2004-20230220-en
General
-
Target
8f1eb48698fc03db9deb9b132e6efa69d5a75487b8c9bc50615e9b42e2281168
-
Size
2.3MB
-
MD5
e6c9945c36611de81fc333a3a22aaeb3
-
SHA1
72e5e15ba5f08b106c38b8ceaedcafb672cc10e4
-
SHA256
8f1eb48698fc03db9deb9b132e6efa69d5a75487b8c9bc50615e9b42e2281168
-
SHA512
18e900c6f69e5be102da2da051f6310e13c626eacf81124d6b74c708efe460efa997149d25843ef290fe91b697f2f6e138e41707da49c792fc661519e8af43b9
-
SSDEEP
49152:hC0UVA5aEXQwn+n27MQcoxbtE28mecoZjpFqkg/jUFUEWkG6:hC25aCby2gQ178meDjc/jqUEW0
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 8f1eb48698fc03db9deb9b132e6efa69d5a75487b8c9bc50615e9b42e2281168 unpack001/out.upx
Files
-
8f1eb48698fc03db9deb9b132e6efa69d5a75487b8c9bc50615e9b42e2281168.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ