Behavioral task
behavioral1
Sample
09b0e40129783bb783b2d40bdc4df97f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
09b0e40129783bb783b2d40bdc4df97f.exe
Resource
win10v2004-20231215-en
General
-
Target
09b0e40129783bb783b2d40bdc4df97f
-
Size
9KB
-
MD5
09b0e40129783bb783b2d40bdc4df97f
-
SHA1
7dc6524ad3769d517680426ee6e68e96bbdf5787
-
SHA256
8bd4b490aeb1b95f2c40ad3d83f7d6a8e8bd1bfd9a9317c4124d64c932fc50d5
-
SHA512
1278af14f7f5d6de077e9003aaefa414fbbb2aa8cac0446abdc2eef8408c4bbf9a42e74ee7fddb90ec0b43db823ac1a4579b3bb8145858d576d17c8d0ed96e28
-
SSDEEP
96:nnoV/PR4j9ACO+2b+w8iwoceGUFpcbT5Lca8LQbd6B4PdQtlC54ycJ/2FOEnYJt:noRPG/96Bwolcbhca8kb+4WtjKOuQt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 09b0e40129783bb783b2d40bdc4df97f unpack001/out.upx
Files
-
09b0e40129783bb783b2d40bdc4df97f.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE