Behavioral task
behavioral1
Sample
1003f37322142ba289dbbbc9c59cb83d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1003f37322142ba289dbbbc9c59cb83d.exe
Resource
win10v2004-20231222-en
General
-
Target
1003f37322142ba289dbbbc9c59cb83d
-
Size
48KB
-
MD5
1003f37322142ba289dbbbc9c59cb83d
-
SHA1
ff2c2b2b784a99a6ecd3da03ca35e88c768d900d
-
SHA256
77fbce9fe94f8731ca88d40db9ea50c5288a77a00ea5afc554fdf6c820353b3e
-
SHA512
859dcdd1f16263a283101fb7f737fa40da6d91a3047dfbb789d30d4513d193e65f9aacd6ad44f8d1dc0fb27c0877b9e5910f6239d29ebfd4cbb3a9fb0e672c8a
-
SSDEEP
768:J9hDPgSxKSPlG3+6n/Mp4Tc68mGhE7kL1qZhOxJIncqLgNjgLfuCd/wi:NrRxrGu6nkp4Tt8mGhf1/xSLgox4
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Metasploit family
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 1003f37322142ba289dbbbc9c59cb83d unpack001/out.upx
Files
-
1003f37322142ba289dbbbc9c59cb83d.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.data Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ