Behavioral task
behavioral1
Sample
060be50048af09d0e2f2f1a83b83c1fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
060be50048af09d0e2f2f1a83b83c1fb.exe
Resource
win10v2004-20231215-en
General
-
Target
060be50048af09d0e2f2f1a83b83c1fb
-
Size
22KB
-
MD5
060be50048af09d0e2f2f1a83b83c1fb
-
SHA1
c254df0b9f74e958bbecae6dedb847ad23829fdd
-
SHA256
ca8c592e34e733692ba7affa341186eea15bab9afb127046a13b959fb367fcc2
-
SHA512
f11d68b321c6b00911957d12aa6025875dba516365b49441ffdc4a8d154474b6ef06cec853f882c83d127cf904bb477d203dc23c5f7f533e581dfaa637a1ab52
-
SSDEEP
384:bSPRtekyxlpKKBIe1f2nzSG4vCEPfmyo6yJIx4gVOt7b9GYEep8c:bwMlF1+n8CEPffolJk7ct7b9XEe
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 060be50048af09d0e2f2f1a83b83c1fb unpack001/out.upx
Files
-
060be50048af09d0e2f2f1a83b83c1fb.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE