Behavioral task
behavioral1
Sample
0767ab065fa60ee3ad21947a24ffc8ec.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0767ab065fa60ee3ad21947a24ffc8ec.exe
Resource
win10v2004-20231222-en
General
-
Target
0767ab065fa60ee3ad21947a24ffc8ec
-
Size
117KB
-
MD5
0767ab065fa60ee3ad21947a24ffc8ec
-
SHA1
210bc095ad0c4b6f9bb0e1d95db3a505f2a5d58d
-
SHA256
b36a83ddb0367f020d17ae81c76a91da53859a7d3231c1a3e2a2a5c3056a6b9a
-
SHA512
c3f9582d185d0abba71aa11aee68980f7e618ea135d43075e039e9440fdfbe794678db75194211730f433210081c2003705282546e0e50884cac808639d9dca3
-
SSDEEP
3072:nObiYzG/eKqdRudBUDnpSniIbkF6xF9ClDBWAes3WxVEY/CB:Obt5KYUdBUj8i5F6QfWAesGPE+CB
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 0767ab065fa60ee3ad21947a24ffc8ec unpack001/out.upx
Files
-
0767ab065fa60ee3ad21947a24ffc8ec.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 172KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ