Behavioral task
behavioral1
Sample
1274fcc1de9be62ab1a57d38099b5ebf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1274fcc1de9be62ab1a57d38099b5ebf.exe
Resource
win10v2004-20231215-en
General
-
Target
1274fcc1de9be62ab1a57d38099b5ebf
-
Size
10KB
-
MD5
1274fcc1de9be62ab1a57d38099b5ebf
-
SHA1
d2238e8777a25e01e7b9fe175d6a4dc8eac22f43
-
SHA256
dba142dc6a3699f530694074d2d9d979f5237160ae98af2db0a7565f5ccd62a9
-
SHA512
695f5a164f312261adbc965815e74034b01eb4d29374dde4f7e5a98be51d19b68ff3c19cec818294980cf7b074bb8addecc495546a27d8882631874050fa9950
-
SSDEEP
192:bCcWgOUyp/pcGR6O+m5po9yHn08n4WQodPsJb1W2NYKjIZ3b8fGoZQC4JhGr:evgUppcUrHPOFIZ3b+bQCEK
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 1274fcc1de9be62ab1a57d38099b5ebf unpack001/out.upx
Files
-
1274fcc1de9be62ab1a57d38099b5ebf.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 37B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1014B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ