Behavioral task
behavioral1
Sample
10046c5939e4e72be8c702304178a2cb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10046c5939e4e72be8c702304178a2cb.exe
Resource
win10v2004-20231215-en
General
-
Target
10046c5939e4e72be8c702304178a2cb
-
Size
23KB
-
MD5
10046c5939e4e72be8c702304178a2cb
-
SHA1
a78ee0bc2e33c9503c82dfb0fa6a765413544ead
-
SHA256
2bbc9ca3dd089960d184b1a1872c16772c4ec085802e33cc7bb9e9aef3726cf2
-
SHA512
73324c6773bc31428c7484c06b9ec39463724afe10bab2270de6c6cc74da50b057ba8bb1b0890e286c0c48cf556119ee3781e80d84fdb02986e7efabef2aeb0c
-
SSDEEP
384:oomgjHNYqsuTBK74KSJFkki22vlRLWl2QSj+UFmWB2QjFd:ooVjHNYq1TBK7EF42GL20hFmyZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10046c5939e4e72be8c702304178a2cb
Files
-
10046c5939e4e72be8c702304178a2cb.exe windows:4 windows x86 arch:x86
ee94fee6d96573394df1ccff29966ad9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_tell
_rotr
_tzset
_umask
_spawnl
_stat64
kernel32
GetNextVDMCommand
GetDriveTypeA
GetStdHandle
GetSystemInfo
GetVersion
GlobalAlloc
Sections
UPX0 Size: - Virtual size: 280KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE