Behavioral task
behavioral1
Sample
0357662d170c68fd2aaa3a1786ad1765.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0357662d170c68fd2aaa3a1786ad1765.exe
Resource
win10v2004-20231222-en
General
-
Target
0357662d170c68fd2aaa3a1786ad1765
-
Size
88KB
-
MD5
0357662d170c68fd2aaa3a1786ad1765
-
SHA1
09194d5a4232cd61c843ad1a726de8542512ae69
-
SHA256
23f516722e64252e7d7e7979e7eb74f4f24ee59f5cf60739afbc551d9e41a639
-
SHA512
d8ead3655ebf60d0976311158536f1dc1b5b01eddc334ba8e9f447356fa214c4f8571770008fd6ed5c83fc2f7525fb80dfc8a54f5017f0bd9ae3f5fc2b81e77d
-
SSDEEP
1536:vqx+x9gUudqgAh0esgkeHP/ah3YCSTF3p2wCJrhzeQkPqRdy9Ic/La4A1sfH:UIgUuALgdaK09I5JNe1yRdy9hTcqP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 0357662d170c68fd2aaa3a1786ad1765 unpack001/out.upx
Files
-
0357662d170c68fd2aaa3a1786ad1765.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 160KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE