Behavioral task
behavioral1
Sample
01aa470a6d7897c697e4e1818e7eb787.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01aa470a6d7897c697e4e1818e7eb787.exe
Resource
win10v2004-20231222-en
General
-
Target
01aa470a6d7897c697e4e1818e7eb787
-
Size
63KB
-
MD5
01aa470a6d7897c697e4e1818e7eb787
-
SHA1
2ecb40198d9df7032f8aac95403aed4e9a68289e
-
SHA256
6a91d22323c548e969453876eb5f0f9d67f88dda1cee38996b83c3a331088dff
-
SHA512
b7209066fc03c354b3827b1076813318482ffd98af73beaa30ccf7589ebdc52cc3937eec9dcb7ec44bb1277c24ce5e24170715527577ca6a02d8b76e3c0231e7
-
SSDEEP
1536:NYfv+f5r87lK+aOX4UA/QtLdEduT1hVi011HsGf:NYOfuK+NtA/QtLdiuTjth
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01aa470a6d7897c697e4e1818e7eb787
Files
-
01aa470a6d7897c697e4e1818e7eb787.exe windows:4 windows x86 arch:x86
7a7803027531302026dedc7b5f6025f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
Sections
UPX0 Size: - Virtual size: 648KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE