Behavioral task
behavioral1
Sample
6e615d50cb367bfb92bc1651be3812ed.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6e615d50cb367bfb92bc1651be3812ed.exe
Resource
win10v2004-20231215-en
General
-
Target
6e615d50cb367bfb92bc1651be3812ed
-
Size
632KB
-
MD5
6e615d50cb367bfb92bc1651be3812ed
-
SHA1
a03b37c3dcbc0059cfaac6186cd0ce93d922d7ef
-
SHA256
34e519de9e38f0ff0b76104b71a1368975c942f2fe67d72c3c20e09a394950c4
-
SHA512
30b8c13481613ad74f22d19206c7d7b8e3d14fa856cd1991c2e8f42b683cf1469080ad26f92e16aaa5955a3ab786adf49a669f5e2c099deccd161e05593d4789
-
SSDEEP
12288:0lqh9SK4zM/AEIGrBsynbiW07gluKQ5FZJgu94VBdJu/16OLcQi/9:04hwMFzrBOW07glVQ5FnggYBu/UOL2
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 6e615d50cb367bfb92bc1651be3812ed unpack001/out.upx
Files
-
6e615d50cb367bfb92bc1651be3812ed.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ