Behavioral task
behavioral1
Sample
00660b5647addd5a209d682b8ded414c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00660b5647addd5a209d682b8ded414c.exe
Resource
win10v2004-20231222-en
General
-
Target
00660b5647addd5a209d682b8ded414c
-
Size
456KB
-
MD5
00660b5647addd5a209d682b8ded414c
-
SHA1
4d16cbee70c25cd699a11e968a3ec229f2706346
-
SHA256
44b4daf27b79abfdcd0ac6b4c83f21f051bac2f0f9d5b094445361b9423a6dfa
-
SHA512
51dcd0690164da9e01fec3fcdff24eed9a7000dfaf94f1381782edf8cbc9b7972e543a9e4cf4f68d0659c6b3aaf32f2ace3ddf59d7eed76783a9d8abbaa27664
-
SSDEEP
6144:5YZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0eRTGyQlTgALXqo1jmUZxL6xQGQgg:5SNC80I+cR3R03VseIPZNLXqs76P
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00660b5647addd5a209d682b8ded414c
Files
-
00660b5647addd5a209d682b8ded414c.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 384KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 223KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 201KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE