Behavioral task
behavioral1
Sample
138a6f55d0fcc9c9f33690380f2c16c2.exe
Resource
win7-20231215-en
General
-
Target
138a6f55d0fcc9c9f33690380f2c16c2
-
Size
5KB
-
MD5
138a6f55d0fcc9c9f33690380f2c16c2
-
SHA1
c26918273fd4c6d5e51f52ae2818063667c33021
-
SHA256
7657e6e84e42b38fd3d145e26b0e63fa99bc952cef57960d742c9bacca7f7485
-
SHA512
2ccfcadf470a2b1b81611ca790a1b5e04fb533583d98715b0e83fe2864d6d3449a303b697be71e2c00461c5bfb91b9064fb8a7d0bea2cf0ebcea29ad6422c792
-
SSDEEP
96:ZZ1rYeE3YCHjIKHIJLo4ir/PBOePWCHEKW5w:ZE3YCk8ocvTP4oWCkKW5w
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 138a6f55d0fcc9c9f33690380f2c16c2 unpack001/out.upx
Files
-
138a6f55d0fcc9c9f33690380f2c16c2.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ