Behavioral task
behavioral1
Sample
38600bd2ce61c3d00b6d3257b964374e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38600bd2ce61c3d00b6d3257b964374e.exe
Resource
win10v2004-20231222-en
General
-
Target
38600bd2ce61c3d00b6d3257b964374e
-
Size
4.8MB
-
MD5
38600bd2ce61c3d00b6d3257b964374e
-
SHA1
ccaa11512f7b626abc177735a58de33f24657dbc
-
SHA256
75336bc64d251cdcd387c9a3c16fe2e7cd2c22faa85ab876b0b5f20e79bfdae2
-
SHA512
8610651f91f12636989f41a73e25966c52c131124211b54804b84d05386c3c63f51867c7ffd739e69e008af282f0ef3e108efe7b15d93a1e0813dcd937d2ed97
-
SSDEEP
98304:A222UOyRHAwnq9cHdBhd7LE/PhbLyqYDkzy1HbwAbw7Nu9+jLF1kd:NwnscD3E3RGqKk+FbQF1kd
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 38600bd2ce61c3d00b6d3257b964374e unpack001/out.upx
Files
-
38600bd2ce61c3d00b6d3257b964374e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ