Behavioral task
behavioral1
Sample
fb66077807edaedb415a79bd0c2846b2db899a08d6575b127588c67a36524dce.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
fb66077807edaedb415a79bd0c2846b2db899a08d6575b127588c67a36524dce.exe
Resource
win10v2004-20230703-en
General
-
Target
fb66077807edaedb415a79bd0c2846b2db899a08d6575b127588c67a36524dce
-
Size
2.4MB
-
MD5
0b8ffafebcaf003332e01a75dd1cab48
-
SHA1
aa94539be52f354d4049d9e520ce926ba4e6eaf9
-
SHA256
fb66077807edaedb415a79bd0c2846b2db899a08d6575b127588c67a36524dce
-
SHA512
f95f92b82b3998d9ab3ccd68340f4161363f3f176eb66e1e3d057b6f5d17551a0bb988bacb91ede9f04ad031ff9c0f753c5793a64be2fc9b1e0840f20e27c198
-
SSDEEP
49152:x4w2cRyYxemUuDB9WZH4xSnpAQuHThCzqBhZyk8Rw9dnVw/cQIKwXpM1A:ymFxHF9WZHYAuHTjhYk8RQ9xXe1
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb66077807edaedb415a79bd0c2846b2db899a08d6575b127588c67a36524dce
Files
-
fb66077807edaedb415a79bd0c2846b2db899a08d6575b127588c67a36524dce.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 9.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE