Behavioral task
behavioral1
Sample
daa1bd47af09353690658243e748dca40ff08713cb26322eb22cf1a68fba7528.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
daa1bd47af09353690658243e748dca40ff08713cb26322eb22cf1a68fba7528.exe
Resource
win10v2004-20230915-en
General
-
Target
daa1bd47af09353690658243e748dca40ff08713cb26322eb22cf1a68fba7528
-
Size
54KB
-
MD5
ed81ca544fb98a6b2744986c85942684
-
SHA1
f65128cafa06707ad384e7d9702e2e8166cd7570
-
SHA256
daa1bd47af09353690658243e748dca40ff08713cb26322eb22cf1a68fba7528
-
SHA512
79f473c6b4e46513ba40932e63cf125fd8c76e8274666fba66f2757244fcf9215a78dcf679f74b2e218ae543008a62c39351821c169ecd8aac9cb7f4224e5d63
-
SSDEEP
1536:B3pZ/L+NrxM8GaAmL1cYNX7M3VzT6koIHr/4x5U:flqBlL1cYxOO0Hr/4x5
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource daa1bd47af09353690658243e748dca40ff08713cb26322eb22cf1a68fba7528 unpack001/out.upx
Files
-
daa1bd47af09353690658243e748dca40ff08713cb26322eb22cf1a68fba7528.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 72KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ