Behavioral task
behavioral1
Sample
050d8f7ad3ee7fedee5b117bcadb6d01.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
050d8f7ad3ee7fedee5b117bcadb6d01.exe
Resource
win10v2004-20231215-en
General
-
Target
050d8f7ad3ee7fedee5b117bcadb6d01
-
Size
12KB
-
MD5
050d8f7ad3ee7fedee5b117bcadb6d01
-
SHA1
492b94d974d6b4514ba44d136b66e9bfac788fc5
-
SHA256
c26a2962d3336cb361053a044a76f8dcd83dcfe3cba2091adfaa2d9945a31e41
-
SHA512
690aa5c67b8471ea17d94552d1228adbf2c96135fe5df8d82b85cfb72b646d3fda3515885e7df0cd431af31b35ba73f6d6327667eb8d23d1c5b60774653dffcc
-
SSDEEP
192:NCdmFZOdvlh6xPOK+L9zBjVyFB6W4WhvbL5Qm68LFW7HQ9jffMdpmjTTNWCbZk:Qdicdvlh6YxLBySW48v2m/h9jffxT4Ku
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 050d8f7ad3ee7fedee5b117bcadb6d01 unpack001/out.upx
Files
-
050d8f7ad3ee7fedee5b117bcadb6d01.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 694B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ