Behavioral task
behavioral1
Sample
4ba4ac43d3af538c5c1e4102c6e5b197d2c88eb1eea986253288e5c1cfb7b61c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4ba4ac43d3af538c5c1e4102c6e5b197d2c88eb1eea986253288e5c1cfb7b61c.exe
Resource
win10v2004-20230703-en
General
-
Target
4ba4ac43d3af538c5c1e4102c6e5b197d2c88eb1eea986253288e5c1cfb7b61c
-
Size
4.4MB
-
MD5
27a3bd3f3f26e42ccecaa32a641395f8
-
SHA1
085c7ee3aec87926a46920f5a246228347178f39
-
SHA256
4ba4ac43d3af538c5c1e4102c6e5b197d2c88eb1eea986253288e5c1cfb7b61c
-
SHA512
df709a320640e3954e69310fb287df4e2a45d3a1bfffd877df995782b33b99bbe9a747b615496fc318a4b4864d94abdef3ba590aa5171f07be8ecacc062b391b
-
SSDEEP
98304:FFrkvz29kdJWxF+gqtTxgdsgqt+mWzF7yGmNVoOnwoaG:zwvz1JWxQg12gqomUF7CnhaG
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ba4ac43d3af538c5c1e4102c6e5b197d2c88eb1eea986253288e5c1cfb7b61c
Files
-
4ba4ac43d3af538c5c1e4102c6e5b197d2c88eb1eea986253288e5c1cfb7b61c.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 4.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE