Behavioral task
behavioral1
Sample
0bb27bede821766f5212d3055b6117b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0bb27bede821766f5212d3055b6117b3.exe
Resource
win10v2004-20231215-en
General
-
Target
0bb27bede821766f5212d3055b6117b3
-
Size
49KB
-
MD5
0bb27bede821766f5212d3055b6117b3
-
SHA1
b06236e9b2daf155e75d3be4c25bde5b658bb01c
-
SHA256
36c68f26e9a67133b2132469c891e74b7c4e4b4cd4820cae99986992be4700ad
-
SHA512
6fc11f99408a4b01051c080cac9c89f99eb1daf134e180b5f5c931ed8b82eb255cd23a49dfa3de9854e2f0b854f959213071fd51108b3a3708d1bd7d372bfef2
-
SSDEEP
1536:kT1fluf80p5MNLRU5ze8fTHKX3UnBCTO8bjn:iOffp5ARUBe8fTHKUnBCTOw
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bb27bede821766f5212d3055b6117b3
Files
-
0bb27bede821766f5212d3055b6117b3.exe windows:4 windows x86 arch:x86
90ad4ea86bed0b180a3a74906e00fd48
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ReplaceTextA
shell32
StrStrIW
user32
DdeQueryConvInfo
kernel32
ExitProcess
Sections
UPX0 Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE