Behavioral task
behavioral1
Sample
402e0d0d8f15ab31ba68dadf3805e822dd93cadd53f74a53249f86b1038350ba.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
402e0d0d8f15ab31ba68dadf3805e822dd93cadd53f74a53249f86b1038350ba.exe
Resource
win10v2004-20231020-en
General
-
Target
402e0d0d8f15ab31ba68dadf3805e822dd93cadd53f74a53249f86b1038350ba
-
Size
1.5MB
-
MD5
1bb445a0444616b569556e374133f3e5
-
SHA1
c8f7fee3b87f1402f5662eff69d96e41f815ed74
-
SHA256
402e0d0d8f15ab31ba68dadf3805e822dd93cadd53f74a53249f86b1038350ba
-
SHA512
3ec91ce591650319de05c8c3326aa2475a10daf3997ffa0675d26b1d12a34287302495cc2f77c5c72f935b526d647c728600a7897b80553b9b4570382a11523b
-
SSDEEP
49152:y4DZE7mdbWHgVO1LkU4HPikKytV3BuFJyMK9gnzzRb:bDZyAVKz4HPiFCVAFgMXzzRb
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 402e0d0d8f15ab31ba68dadf3805e822dd93cadd53f74a53249f86b1038350ba
Files
-
402e0d0d8f15ab31ba68dadf3805e822dd93cadd53f74a53249f86b1038350ba.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 5.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE