Behavioral task
behavioral1
Sample
sample.exe
Resource
win10-20230703-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230703-en
General
-
Target
def2f01fbd4be85f48101e5ab7ddd82efb720e67daa6838f30fd8dcda1977563.bin.sample.gz
-
Size
3.4MB
-
MD5
dbfc7fb14cda25798c854c1e75c35e45
-
SHA1
935b0ababdd1737cd89c0d583cd1744c0da893c2
-
SHA256
c848be4f3657006b8fb94706d5d77940a12687c03f0f271e5a69c5a29845b205
-
SHA512
3cfb23fe54dcfb62b11a75a7c3b0bd43f53322a716671b7c3688ad4f631973cdd3eba7103d56be415980b4701257bae2dc93f5c36af6d82c1167c887f49f0840
-
SSDEEP
98304:MXivibhcwtmKwJ9HjmUnn4UKIk7OFrooBMfRvcjn:kwp6wn43RarLBMfRY
Malware Config
Signatures
-
resource yara_rule static1/unpack001/sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/sample
Files
-
def2f01fbd4be85f48101e5ab7ddd82efb720e67daa6838f30fd8dcda1977563.bin.sample.gz.gz
-
sample.exe windows x64
0c1e0b4890cc87424a0fd0132621e9be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LoadLibraryA
ExitProcess
GetProcAddress
Sections
UPX0 Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SCY Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE