Behavioral task
behavioral1
Sample
2d0c6ab83bef54ecffafd8e141dbc10987fdb3de58f21a96aa36fdfa30e90856.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2d0c6ab83bef54ecffafd8e141dbc10987fdb3de58f21a96aa36fdfa30e90856.exe
Resource
win10v2004-20231023-en
General
-
Target
2d0c6ab83bef54ecffafd8e141dbc10987fdb3de58f21a96aa36fdfa30e90856.exe.zip
-
Size
1.1MB
-
MD5
350650b9649e24b4b5083a2f48aeac8b
-
SHA1
07f62d63aea144966d8db3266ae4f2a355819b46
-
SHA256
0b7330be37d495e14d868b29a060c206e2e56bf5abe875a067e5646379567675
-
SHA512
0da8aadd5539933a2fcc04aa03dfdbbf5a9017d7111ae9743748212ebc52e30f1f6ffdc271bb22f02899c7aff9643ec4cf76cbec8835efc10a1e8ef162c01fe7
-
SSDEEP
24576:ZdQh9Ek6E5eAevn8AAQfSbfiQDOAmPDUaq3i9gp4yrCYK:jQhugeZ8ufSbqwZcDUaqcgr/K
Malware Config
Signatures
-
resource yara_rule static1/unpack001/2d0c6ab83bef54ecffafd8e141dbc10987fdb3de58f21a96aa36fdfa30e90856.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2d0c6ab83bef54ecffafd8e141dbc10987fdb3de58f21a96aa36fdfa30e90856.exe
Files
-
2d0c6ab83bef54ecffafd8e141dbc10987fdb3de58f21a96aa36fdfa30e90856.exe.zip.zip
Password: infected
-
2d0c6ab83bef54ecffafd8e141dbc10987fdb3de58f21a96aa36fdfa30e90856.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 236KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma1 Size: 896KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE