Behavioral task
behavioral1
Sample
020eeacd77f05ca4e56c5879cad9b2d5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
020eeacd77f05ca4e56c5879cad9b2d5.dll
Resource
win10v2004-20231215-en
General
-
Target
020eeacd77f05ca4e56c5879cad9b2d5
-
Size
12KB
-
MD5
020eeacd77f05ca4e56c5879cad9b2d5
-
SHA1
e131df8e597620caf8e671a2edb340cbc7339b29
-
SHA256
8ac03d40b82c96b4f9d3638830eedb0fa05405a6738af8ab8385acb3345cf0ab
-
SHA512
af2d3e798d5f26e7d36a38b3fc0998964dac5a34ce2edf2e69246c9f05942558e8f0057e1102cf7853fdfa878b6f0adf1a2af5fd06758ce3e3ee0b9d1289829a
-
SSDEEP
192:dC+sAM4DtdlxPvJTClDtI3+thrlKAlV6UWmYIKsw3a5iharlOC:dC+sAh/lxk1tW+th5KAlV6UAC
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 020eeacd77f05ca4e56c5879cad9b2d5 unpack001/out.upx
Files
-
020eeacd77f05ca4e56c5879cad9b2d5.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ