Behavioral task
behavioral1
Sample
4103f8045b82c37ced8574976d7396b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4103f8045b82c37ced8574976d7396b1.exe
Resource
win10v2004-20231215-en
General
-
Target
4103f8045b82c37ced8574976d7396b1
-
Size
40KB
-
MD5
4103f8045b82c37ced8574976d7396b1
-
SHA1
a2ad56fc11b02bbd60be44df21ca6533f4ed54ca
-
SHA256
cb6ad683b73353922b832365bd88d919db7717ce701866264b7d269359d29293
-
SHA512
96a06e779d70186140577d85c93c58fc03040efd445100d9be2a833e81495adb7db4591e98eb78484f0864217c3d54686cd89f76409e61d38007415c18206364
-
SSDEEP
768:DYkPBF/KN4skG6q093w0nWeXAM6lH6qCnouzmpLZkPs4:D1JoCHRV6gqCnQLaz
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 4103f8045b82c37ced8574976d7396b1 unpack001/out.upx
Files
-
4103f8045b82c37ced8574976d7396b1.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe .js windows:4 windows x86 arch:x86 polyglot
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ