Behavioral task
behavioral1
Sample
223c3ce7d4c4ab90a18968923575b777b1692b299b02578b0cebdb913ce8074c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
223c3ce7d4c4ab90a18968923575b777b1692b299b02578b0cebdb913ce8074c.exe
Resource
win10v2004-20230915-en
General
-
Target
223c3ce7d4c4ab90a18968923575b777b1692b299b02578b0cebdb913ce8074c
-
Size
4.6MB
-
MD5
40071b03963ed9c50c42dcc5f1eab17f
-
SHA1
8962de67d0a03a9a3a7791e520832255f62f1282
-
SHA256
223c3ce7d4c4ab90a18968923575b777b1692b299b02578b0cebdb913ce8074c
-
SHA512
2d940f4cd986da03686543e8259afa2e9006f94c36b44c2254978d9c89e87ef0a4cdecbbcf4836af68618ce9daee9addbe84606343042c2beeec678701f316fe
-
SSDEEP
98304:W+S9bxmTaFGQ0+mra19Dr7AoVMRuT7mGfVmH68TeOq8l:NM90YGQ021tr71VLnmKVma8KP8l
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 223c3ce7d4c4ab90a18968923575b777b1692b299b02578b0cebdb913ce8074c
Files
-
223c3ce7d4c4ab90a18968923575b777b1692b299b02578b0cebdb913ce8074c.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 4.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 372KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE