Behavioral task
behavioral1
Sample
730de694b8443696af3bfc108d6f2c0a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
730de694b8443696af3bfc108d6f2c0a.exe
Resource
win10v2004-20231222-en
General
-
Target
730de694b8443696af3bfc108d6f2c0a
-
Size
375KB
-
MD5
730de694b8443696af3bfc108d6f2c0a
-
SHA1
529e825b10d0bd60185be2c030888d08806b902d
-
SHA256
51a230a666e8d984fc97834f24bb0c47db28d321b8bbef8472370686fdcfc447
-
SHA512
858d3b87c3ffe5d3fd154a347659eb63f6b02497390e23d746a8657053fad4624827ac664a9a0eabee6ed6ebd5cc31b39aac6fe2709791745599fbd874b3ad6e
-
SSDEEP
6144:lvIj8N0oK0zat8GzwHNUKb2oK0zat8GzwzkIXfYnPY9lrhdMwPT318TmS72Z4:lQjeK0qoDrK0qjIQnAYwPzSKS72Z4
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 730de694b8443696af3bfc108d6f2c0a unpack001/out.upx
Files
-
730de694b8443696af3bfc108d6f2c0a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 17.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe .js windows:4 windows x86 arch:x86 polyglot
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.bss Size: - Virtual size: 17.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE