Behavioral task
behavioral1
Sample
0b19f01ec4ea12a82e90ee85f9b16ad4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b19f01ec4ea12a82e90ee85f9b16ad4.exe
Resource
win10v2004-20231215-en
General
-
Target
0b19f01ec4ea12a82e90ee85f9b16ad4
-
Size
14KB
-
MD5
0b19f01ec4ea12a82e90ee85f9b16ad4
-
SHA1
f0f172100caf1f397d3e55de9e34efd55dda38b0
-
SHA256
8f734945c3086ab2420347f2890f2df4e04e5ae75cd49a258dd990804932a19a
-
SHA512
29a2c2fe5867daa2be3951f5bfd5f1c64ae3d497694d13b0afac3d722b6941237ed11d7cc2103bb209eefaf1f976b5463590fcd3df4dabd1014202d94fede3f4
-
SSDEEP
384:NhszPTPjp9ENTIaD17MQVzmDO0NHNP7UUk1EfVEnvhT49f0azrY:jybQ+wNMQ8q0zP7UhmevhT49k
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 0b19f01ec4ea12a82e90ee85f9b16ad4 unpack001/out.upx
Files
-
0b19f01ec4ea12a82e90ee85f9b16ad4.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ