Behavioral task
behavioral1
Sample
4e6b8063530a551dd9aa625eaa6c46d53aa9e3319dac3faf7ee3b6350ca520e8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4e6b8063530a551dd9aa625eaa6c46d53aa9e3319dac3faf7ee3b6350ca520e8.exe
Resource
win10v2004-20230703-en
General
-
Target
4e6b8063530a551dd9aa625eaa6c46d53aa9e3319dac3faf7ee3b6350ca520e8
-
Size
1.5MB
-
MD5
1fd2e40d35dade919e873e2f0184d819
-
SHA1
4e3304876ef3c2dac08174d4b734934df13f7cf8
-
SHA256
4e6b8063530a551dd9aa625eaa6c46d53aa9e3319dac3faf7ee3b6350ca520e8
-
SHA512
edceee4bff01baefcf5c3d6744a312da939f0874867f976d9ed7e7b5c2910359701e866d3b7e2564cc04930d43ea407d0a495aa2afd4aa5681ef7727e958ac37
-
SSDEEP
49152:y4DZE7mdbWHgVO1LkU4HPikKytV3BuFJyMK9gnzzR8:bDZyAVKz4HPiFCVAFgMXzzR8
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e6b8063530a551dd9aa625eaa6c46d53aa9e3319dac3faf7ee3b6350ca520e8
Files
-
4e6b8063530a551dd9aa625eaa6c46d53aa9e3319dac3faf7ee3b6350ca520e8.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 5.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE