Behavioral task
behavioral1
Sample
3c24e95ea8e6d2eaf686df746dbdf29b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c24e95ea8e6d2eaf686df746dbdf29b.exe
Resource
win10v2004-20231215-en
General
-
Target
3c24e95ea8e6d2eaf686df746dbdf29b
-
Size
13KB
-
MD5
3c24e95ea8e6d2eaf686df746dbdf29b
-
SHA1
289bcd2b7a85117ef15a2b2673623c76d39fa49b
-
SHA256
f01131154067427a2454fe0ad48e7a26c51e1d9e34ecbcfc7fac53d3a8c6075c
-
SHA512
30d0729c1edb15144d7b55c10e02984e14ad9398e83e3620f47611d168c5da671c7c4825e5748fae7924275e212744af5819422b587ce532222fc19513d2741e
-
SSDEEP
192:G0WPLOEYJFGY+fzWfzjwLUoeJ/RBkn30G90xHRc7o3TccU+TY0F+UtYtXae4W0n:G0WKDfg5e5RA30GyxHRio3gcUsHB9W0n
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 3c24e95ea8e6d2eaf686df746dbdf29b unpack001/out.upx
Files
-
3c24e95ea8e6d2eaf686df746dbdf29b.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ