Behavioral task
behavioral1
Sample
b42349a1d1927f15749fcdeb5ac419d474fb78fdd5326d7bc7f1f98ac20cb808.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b42349a1d1927f15749fcdeb5ac419d474fb78fdd5326d7bc7f1f98ac20cb808.exe
Resource
win10v2004-20230915-en
General
-
Target
b42349a1d1927f15749fcdeb5ac419d474fb78fdd5326d7bc7f1f98ac20cb808
-
Size
1.5MB
-
MD5
a0923663d9953d235f75c322998e3c58
-
SHA1
43a5cbcd3b36a12f20e9ba05508ef68f5b4d3c14
-
SHA256
b42349a1d1927f15749fcdeb5ac419d474fb78fdd5326d7bc7f1f98ac20cb808
-
SHA512
4b83886746bb557bcc9803c4f028ab722782ae96e4a13394e7cbbba46f5d307e7cc861a5eb9ec8b6a2ae4032ffa61a0448f3c4a553b6b6182e50f2140a74a50e
-
SSDEEP
49152:6AZQ3Fq+usSlPfOwPpMRQO4eAsqWH6zRF:6Ai3kpsihPpM3fd6zRF
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b42349a1d1927f15749fcdeb5ac419d474fb78fdd5326d7bc7f1f98ac20cb808
Files
-
b42349a1d1927f15749fcdeb5ac419d474fb78fdd5326d7bc7f1f98ac20cb808.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE