Behavioral task
behavioral1
Sample
2f40d51b8159508854cb9e6f9a201f5bd84d86f67967cc74fd51b6abd859d757.exe
Resource
win7-20230831-en
General
-
Target
2f40d51b8159508854cb9e6f9a201f5bd84d86f67967cc74fd51b6abd859d757
-
Size
683KB
-
MD5
f991669db43f126ee13c31da6d6e6c63
-
SHA1
0f273b7a3dbeca4246286fb90d96e5520e35a46b
-
SHA256
2f40d51b8159508854cb9e6f9a201f5bd84d86f67967cc74fd51b6abd859d757
-
SHA512
f32eebc5163e94dd23c100a0e978ebc447f150afcf8e91cddccd519ff6801fca9186df74b962ec30a4270e7fc3d0988e4e3653595cd19f0b04479a8f268e40ac
-
SSDEEP
12288:jl0hu/J/QnNEsLi1fVnPALtV2cxIUjrmiqL/0TM6HKyGr1TDxx136h:C0/WNEseZVPArfdC0TDHKpxxA
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2f40d51b8159508854cb9e6f9a201f5bd84d86f67967cc74fd51b6abd859d757 unpack001/out.upx
Files
-
2f40d51b8159508854cb9e6f9a201f5bd84d86f67967cc74fd51b6abd859d757.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 3.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 658KB - Virtual size: 660KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512KB - Virtual size: 508KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 404KB - Virtual size: 666KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ