Behavioral task
behavioral1
Sample
fdd8c2eabfb72d2f9b5fdff75cdc277e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fdd8c2eabfb72d2f9b5fdff75cdc277e.exe
Resource
win10v2004-20231215-en
General
-
Target
fdd8c2eabfb72d2f9b5fdff75cdc277e
-
Size
11KB
-
MD5
fdd8c2eabfb72d2f9b5fdff75cdc277e
-
SHA1
be67141aac1e556c27e4da6e1e1b98d03b974a45
-
SHA256
e2eed9904033ebdfd524fa68b7cbbe3d5920858158b4ef527caca24faa805eec
-
SHA512
77b993d967e02daa2e9f6267ea3b35a7b05a232fabb41bb60fbb247c94cd4a9d49b89bf944a241a49534b760f40bf32047323eb34369a096b2a9488b2fb4530a
-
SSDEEP
192:1uTBNzAQjalANO5v0s7c7TkPZtXmcOVdB5JR7eGaR8:jQK/pPA7TkPZtX4BPRTV
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource fdd8c2eabfb72d2f9b5fdff75cdc277e unpack001/out.upx
Files
-
fdd8c2eabfb72d2f9b5fdff75cdc277e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
bmgnfbd Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hjretrnd Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
thyjetrh Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE