Behavioral task
behavioral1
Sample
6abb73cf9c8090ab7e44c4c7a93d3b185b80a7c7a05362b6654ba0c87f5a152d.exe
Resource
win7-20230712-en
General
-
Target
6abb73cf9c8090ab7e44c4c7a93d3b185b80a7c7a05362b6654ba0c87f5a152d
-
Size
438KB
-
MD5
de6c75c8026add9057e294f2cbd716d8
-
SHA1
064f8f94d8024b63a715950a530a1f15af80fd5b
-
SHA256
6abb73cf9c8090ab7e44c4c7a93d3b185b80a7c7a05362b6654ba0c87f5a152d
-
SHA512
6b5dfd9c920f8c281adb30f5157845eb4d83ebe617a888b895efe506a7b8f96e10c6f065b071621d672546d7ed27f35379615ad98d02c40b125be6dd7d291751
-
SSDEEP
12288:vKOnnSviCLLUW6aS8Bvod/7s8i10kNFzGiW7i7sVmQM:y/v9LLUWi8JsBi10kncL4QM
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 6abb73cf9c8090ab7e44c4c7a93d3b185b80a7c7a05362b6654ba0c87f5a152d unpack001/out.upx
Files
-
6abb73cf9c8090ab7e44c4c7a93d3b185b80a7c7a05362b6654ba0c87f5a152d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 536KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 411KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 528KB - Virtual size: 524KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ