Behavioral task
behavioral1
Sample
4b503e651c42aa2212d4e923b3b35c7dcecfc5e4a47e40657ac5d7260a0b178f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4b503e651c42aa2212d4e923b3b35c7dcecfc5e4a47e40657ac5d7260a0b178f.exe
Resource
win10v2004-20230703-en
General
-
Target
4b503e651c42aa2212d4e923b3b35c7dcecfc5e4a47e40657ac5d7260a0b178f
-
Size
2.5MB
-
MD5
6044815a509bd93d9138a53703c3c67f
-
SHA1
f6514efcbec925ed96eec3b38b7b8d465f639952
-
SHA256
4b503e651c42aa2212d4e923b3b35c7dcecfc5e4a47e40657ac5d7260a0b178f
-
SHA512
37ec3f9f11bf5c0ba31d030f8c2e1c9809ac0f144a8a8f20bb82e3c73993052da474cdfeb49a9a7861a0ffc53006aff7852dae36f67893f5fe7dbc5f764afb24
-
SSDEEP
49152:0BtkSsGmCzv0MGxhST+YcITKSYeibmmYvJR/DvAQwDWY3xqOrAlk:0BLO4FUeiCmYvAQw73cXlk
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b503e651c42aa2212d4e923b3b35c7dcecfc5e4a47e40657ac5d7260a0b178f
Files
-
4b503e651c42aa2212d4e923b3b35c7dcecfc5e4a47e40657ac5d7260a0b178f.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 281KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE