Behavioral task
behavioral1
Sample
NEAS.b4af837b586dd04008b5d58058cc2420.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.b4af837b586dd04008b5d58058cc2420.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b4af837b586dd04008b5d58058cc2420.exe
-
Size
204KB
-
MD5
b4af837b586dd04008b5d58058cc2420
-
SHA1
b3ea32e1f889652288e4c26398b6f3de8f5e4d88
-
SHA256
4d3dadc7514a3d3539cbf92f83476dcb49b66da9f9f9f4fc3637f778123c63ed
-
SHA512
b3f6167e2a22a7ebf572a1002ac0877e3541570eacea6872ba493a1ec7e423a88342df66491379d7914ee28a9d303b96b4a5bb363e70136c62bc60ebb8eec872
-
SSDEEP
3072:SdEUfKj8BYbDiC1ZTK7sxtLUIG5yyoDU9q3XRrMBEGltj95y6hsYDRd6:SUSiZTK40syu
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.b4af837b586dd04008b5d58058cc2420.exe
Files
-
NEAS.b4af837b586dd04008b5d58058cc2420.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 496KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ