Behavioral task
behavioral1
Sample
28be72b103bfeb31d0d7b1842ba1790a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28be72b103bfeb31d0d7b1842ba1790a.exe
Resource
win10v2004-20231215-en
General
-
Target
28be72b103bfeb31d0d7b1842ba1790a
-
Size
2.7MB
-
MD5
28be72b103bfeb31d0d7b1842ba1790a
-
SHA1
0e08b7e3638e142d8e70422f6af9172b7da97a83
-
SHA256
ec85843b377ab7c05902e025adb3aa314dc9dd0078506272c4b8550cd08b9240
-
SHA512
4230af822989a29b9c3522c33f587ca90d060eb4d868a6c5a8836ec47f276da93650dacd59880fc981deeb65e64345bd0433584e461ae2bee34873c681ff09fb
-
SSDEEP
49152:AloWFUzJCbWtqRDRLI1YCod0IOA/y9nk6KlPyTVa2YUfMAWBL8REtLikRTe1KlZO:ADYmLA1sxy9k6K1yTVBJWBL3i+AKlZ6l
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 28be72b103bfeb31d0d7b1842ba1790a unpack001/out.upx
Files
-
28be72b103bfeb31d0d7b1842ba1790a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ