Behavioral task
behavioral1
Sample
0c19b2f74c3b0b2f3ee8ce10f1539de7.exe
Resource
win7-20231129-en
General
-
Target
0c19b2f74c3b0b2f3ee8ce10f1539de7
-
Size
442KB
-
MD5
0c19b2f74c3b0b2f3ee8ce10f1539de7
-
SHA1
daf0d5675404446e6b26bf68df94b0d5affba043
-
SHA256
090c859700cadde4f8f298118c522d9aa063fb0c4da3cc4e02c1916fabeb99d8
-
SHA512
0bfae3dbd7b3df25dfb29218c6a8b47ffb9a8a5321ff824fa01fc2cfd66ad87a7baee5e15043211761554398ddb77dea0723a6e04aaa311d37ec0a60487df7c7
-
SSDEEP
12288:5MXYCsBoM+sSzPqXQ23S3sgGKtFVcRAK9nER4UTHfY6v:5MzqXv3S3iKtAGKS4efY6v
Malware Config
Signatures
-
resource yara_rule static1/unpack001/out.upx themida -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 0c19b2f74c3b0b2f3ee8ce10f1539de7 unpack001/out.upx
Files
-
0c19b2f74c3b0b2f3ee8ce10f1539de7.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 176KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 389KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Themida Size: 514KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE