Behavioral task
behavioral1
Sample
14abc9463787a03793f3723a5e850fdfd95531b9d9f95c8e6c4ceff379778950.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
14abc9463787a03793f3723a5e850fdfd95531b9d9f95c8e6c4ceff379778950.exe
Resource
win10v2004-20230703-en
General
-
Target
14abc9463787a03793f3723a5e850fdfd95531b9d9f95c8e6c4ceff379778950
-
Size
2.3MB
-
MD5
34082daac48eb4da0f5cae788c36747e
-
SHA1
d25ba0ca825e51559ecc7cfa5fe522748b61f138
-
SHA256
14abc9463787a03793f3723a5e850fdfd95531b9d9f95c8e6c4ceff379778950
-
SHA512
8aa471d99b07fb97f38788a205c4eaaf58521ccefc5aa5a2556cdca413a86b696977f67adaf691d1d4c3b1e8db61dc0074faf85fbc42db193daf420c2e0421f6
-
SSDEEP
49152:knyj12szJ5KPU+0UxiHjKvpfykomUECldBFdaUaYDye4R:knyj3Ux6GpazmCbL4YB+
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14abc9463787a03793f3723a5e850fdfd95531b9d9f95c8e6c4ceff379778950
Files
-
14abc9463787a03793f3723a5e850fdfd95531b9d9f95c8e6c4ceff379778950.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE