Behavioral task
behavioral1
Sample
4e1a0761cce16b2173cb212700d9c3248a3b072b038a637c6240fe3c7b6afc61.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4e1a0761cce16b2173cb212700d9c3248a3b072b038a637c6240fe3c7b6afc61.exe
Resource
win10v2004-20231025-en
General
-
Target
4e1a0761cce16b2173cb212700d9c3248a3b072b038a637c6240fe3c7b6afc61
-
Size
1.5MB
-
MD5
6923304e2405259803c9957c4177da3a
-
SHA1
d6f94092f3d3bd3ade1a678933bde835d16d4ea5
-
SHA256
4e1a0761cce16b2173cb212700d9c3248a3b072b038a637c6240fe3c7b6afc61
-
SHA512
580cb654085cf2e686e33eded944e7f1b694f9b7a4c493528bed7b322caa57146f8337e4054d3eef4f68d1c637daa9af2c46192fa1f2f40fe8264dd41068cbe2
-
SSDEEP
49152:y4DZE7mdbWHgVO1LkU4HPikKytV3BuFJyMK9gnzzRt:bDZyAVKz4HPiFCVAFgMXzzRt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e1a0761cce16b2173cb212700d9c3248a3b072b038a637c6240fe3c7b6afc61
Files
-
4e1a0761cce16b2173cb212700d9c3248a3b072b038a637c6240fe3c7b6afc61.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 5.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE