Behavioral task
behavioral1
Sample
0f11fada85e039f0facfebe7c64e3458.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f11fada85e039f0facfebe7c64e3458.exe
Resource
win10v2004-20231215-en
General
-
Target
0f11fada85e039f0facfebe7c64e3458
-
Size
472KB
-
MD5
0f11fada85e039f0facfebe7c64e3458
-
SHA1
9767910e0b5e94252835492f2501439af34a130f
-
SHA256
72abe1282f23d5ae79a47a4770c3de5397b32d0960fdc6e9f59d3de72b858e10
-
SHA512
14b7dace4c0e8ed2036b48b5e65258f518e2f022964e534d6689afe7ecd9aa137be03977175100fc5f0f5296ce0afe018b7c1e49d6d09abba622fb74e0146a62
-
SSDEEP
6144:eR14EKSxaLepD4pFNHuVVE8XdSRo36dug6W4KHDolRp/9q/K5UOBk:ewEhliTiWyvKQWnjolL90QBk
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f11fada85e039f0facfebe7c64e3458
Files
-
0f11fada85e039f0facfebe7c64e3458.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 72KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 270KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1UPX1 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
���� Size: 516B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DexCrypt Size: 78B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DexCrypt Size: 96B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DexCrypt Size: 114B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ