Behavioral task
behavioral1
Sample
79d7d6c2449d71c5f57e3d7274cecc42.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79d7d6c2449d71c5f57e3d7274cecc42.exe
Resource
win10v2004-20231215-en
General
-
Target
79d7d6c2449d71c5f57e3d7274cecc42
-
Size
76KB
-
MD5
79d7d6c2449d71c5f57e3d7274cecc42
-
SHA1
37b651e35c3ffd1641a818ab4a0df7c7054ebe2d
-
SHA256
6ddb0b6b5e144b04775ac4ecac6384c61cb903bdec7d854b9f1f99d0000faea7
-
SHA512
da0d159e88b979f2b9b5270a54a9120d284687d31b1086d5eef66a9e71f7281e9bab2da2bf844d226c63cf6430f8cccb2bbb2a6c968e9e421ebc9015a16f3aee
-
SSDEEP
1536:i0iA2Dg42PQe1l1mwSHkWlxOyFNbvEJ3D6ZWJzzED:32J8QFHLOyHbMJT+Ozg
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 79d7d6c2449d71c5f57e3d7274cecc42 unpack001/out.upx
Files
-
79d7d6c2449d71c5f57e3d7274cecc42.exe windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 72KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 355B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ