Behavioral task
behavioral1
Sample
ad0b611af44a04bf4ebf2042dd837291f9423e8b6ebc0f037f0bd8fe66dd1bdd.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
ad0b611af44a04bf4ebf2042dd837291f9423e8b6ebc0f037f0bd8fe66dd1bdd.exe
Resource
win10v2004-20231023-en
General
-
Target
ad0b611af44a04bf4ebf2042dd837291f9423e8b6ebc0f037f0bd8fe66dd1bdd
-
Size
806KB
-
MD5
1768f1fdf228c3fa2163acea01f02b42
-
SHA1
b49d94a7054b0c93cd33cb6dc7a2c948c13913a4
-
SHA256
ad0b611af44a04bf4ebf2042dd837291f9423e8b6ebc0f037f0bd8fe66dd1bdd
-
SHA512
cdd1da7e6bcf03d2e17944b7058adc044b38b36f71c9ade12fbaf5c8abaaf79f634ab1485bdcdf9cadb998668c0928bcec1550f7be56fb42a6bc890bfe10f503
-
SSDEEP
12288:EerUTJZ4FwWBQqCdiBQ2EWYrAhYFF3hlPs6eBVvLLogRW9y5pHT5k68oS:EuwJZnpPxWiyYpK6Q/ogRW9+9dk6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad0b611af44a04bf4ebf2042dd837291f9423e8b6ebc0f037f0bd8fe66dd1bdd
Files
-
ad0b611af44a04bf4ebf2042dd837291f9423e8b6ebc0f037f0bd8fe66dd1bdd.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 794KB - Virtual size: 796KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE