Behavioral task
behavioral1
Sample
032511557d34380766871edaafb84f0b71cc2bce6b41969b9cef6da586a67a5f.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
032511557d34380766871edaafb84f0b71cc2bce6b41969b9cef6da586a67a5f.exe
Resource
win10v2004-20231020-en
General
-
Target
032511557d34380766871edaafb84f0b71cc2bce6b41969b9cef6da586a67a5f.exe.zip
-
Size
4.1MB
-
MD5
526ce0384fe73f96a4f7c0ac7d541730
-
SHA1
5e718160a6e6f0fb3bc6f429bcf1fe59635cf737
-
SHA256
05ee39195d0eca12cbca29f182f06d1e98fd81361199323833b747f58925b6be
-
SHA512
4a17450e29bd310e1ee55e57cbcc84eccc6878275b39db1d2bcc26a4be72676efdaa020ac5db12bb6490bb2f6f92975216922f45c9cde2879663a92256172fe5
-
SSDEEP
98304:VGVE5wID7n5nYlaT93C8n9ZTi3P6CbmO9KrsdkwLzC/E0HYNUUN:ViUJDDFNpn8P6CaOSQkwLzCYOc
Malware Config
Signatures
-
resource yara_rule static1/unpack001/032511557d34380766871edaafb84f0b71cc2bce6b41969b9cef6da586a67a5f.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/032511557d34380766871edaafb84f0b71cc2bce6b41969b9cef6da586a67a5f.exe unpack002/out.upx
Files
-
032511557d34380766871edaafb84f0b71cc2bce6b41969b9cef6da586a67a5f.exe.zip.zip
Password: infected
-
032511557d34380766871edaafb84f0b71cc2bce6b41969b9cef6da586a67a5f.exe.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 10.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 6.9MB - Virtual size: 6.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rodata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE