Behavioral task
behavioral1
Sample
f8509005cfa84a7c1c32b4aa565a2a0c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f8509005cfa84a7c1c32b4aa565a2a0c.exe
Resource
win10v2004-20231215-en
General
-
Target
f8509005cfa84a7c1c32b4aa565a2a0c
-
Size
617KB
-
MD5
f8509005cfa84a7c1c32b4aa565a2a0c
-
SHA1
f3735a00c3febc4e2105ba03f43e96757c82dc05
-
SHA256
b07dacd6ae24290b2f875152ff7ee315a38df2eb22e9328cbe82991b695fcef4
-
SHA512
13b9eb033fce1de0f7c957e474f20a071357caffee5894b4ad77630ea44e629e9bd011211732fbe8c75ff35351f81a9b8f15a0fc0c9597fbf173eac428cfff4f
-
SSDEEP
384:FP8WSm2YE75x1XSUmvr4O77a1tXtlGyJDFF:FP8NmG75x1XK4AXyB
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource f8509005cfa84a7c1c32b4aa565a2a0c unpack001/out.upx
Files
-
f8509005cfa84a7c1c32b4aa565a2a0c.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE