Behavioral task
behavioral1
Sample
a611dd95346e4ae572a78002954ebee4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a611dd95346e4ae572a78002954ebee4.exe
Resource
win10v2004-20231215-en
General
-
Target
a611dd95346e4ae572a78002954ebee4
-
Size
13KB
-
MD5
a611dd95346e4ae572a78002954ebee4
-
SHA1
2bdf1857d085a842143f277b20965abc57411adb
-
SHA256
182014750815d28faa6ec371c54233ad9ab443fa465507b8f8c27095789f0704
-
SHA512
c86cc3cbee8eaced7a1026daa5e003882e6d56e95cfca6f2fe1cee4751b2bc6b1dc26260bc5c31268f34a1ad791313d3e4c3e50c423afdf0d3de6038be8bbccc
-
SSDEEP
192:yu/hi3spBziWZ91FRMRuVxtqtt6T6EvU7VjxCiX54M6WPqrC/42oq+vLtr9ZCspz:Hw3spBOWZoSxtscZvU7+iXXsLdAeM6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource a611dd95346e4ae572a78002954ebee4 unpack001/out.upx
Files
-
a611dd95346e4ae572a78002954ebee4.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
code Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ