Behavioral task
behavioral1
Sample
NEAS.54e6ef574573652361c666e7213b49e0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.54e6ef574573652361c666e7213b49e0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.54e6ef574573652361c666e7213b49e0.exe
-
Size
98KB
-
MD5
54e6ef574573652361c666e7213b49e0
-
SHA1
1ca41f4a67bdf57355ae4877e9b8ad8ea25eb21a
-
SHA256
537a3e289253c768ab898d17c9546c3e24d9ab82dc1aafc2412e7cf8ba040df0
-
SHA512
8003c71238cdb91e25a2662798d7f0263a1f96ab090fd4afe1adccbaa960f5b1fb4a622519943a88bdf1bbef0141dd3beccfc5d2d10307b6c8477efe0799a736
-
SSDEEP
3072:KnT6kyxdL9L0bGdlrUb+ezOwMef8vXWTAnsG2Ryl6TW7B:K7yxJZ0mUb+ezOwMef8vXWTAnsG2Ryl1
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource NEAS.54e6ef574573652361c666e7213b49e0.exe unpack001/out.upx
Files
-
NEAS.54e6ef574573652361c666e7213b49e0.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ