Behavioral task
behavioral1
Sample
cac701efe8d7501a5b6112784ecb2e1a63d481fc56060711dcf86a13fd01e055.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cac701efe8d7501a5b6112784ecb2e1a63d481fc56060711dcf86a13fd01e055.exe
Resource
win10v2004-20230703-en
General
-
Target
cac701efe8d7501a5b6112784ecb2e1a63d481fc56060711dcf86a13fd01e055
-
Size
40KB
-
MD5
52ecdc332b34562ad315e8e875df9b6a
-
SHA1
16d592f31c12b602b77ecdadafe6f911268773f3
-
SHA256
cac701efe8d7501a5b6112784ecb2e1a63d481fc56060711dcf86a13fd01e055
-
SHA512
085fac1a3b96a71cf349ab18a31506d41b870404b259550d8ec8b27a60432e92023b4baf9631a699f4e8bcc8fef198bf8cc782e539ab99b6fa089edc87b74287
-
SSDEEP
768:XS1vEypOxnVfymVTwCNCe74SOijK45HgtStA9IYaTtC9:XS1sO0nVd0C94SDx5YuA9IY9
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource cac701efe8d7501a5b6112784ecb2e1a63d481fc56060711dcf86a13fd01e055 unpack001/out.upx
Files
-
cac701efe8d7501a5b6112784ecb2e1a63d481fc56060711dcf86a13fd01e055.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ