Behavioral task
behavioral1
Sample
1680ee4aa165b3a8a4df51f12545b253.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1680ee4aa165b3a8a4df51f12545b253.exe
Resource
win10v2004-20231222-en
General
-
Target
1680ee4aa165b3a8a4df51f12545b253
-
Size
41KB
-
MD5
1680ee4aa165b3a8a4df51f12545b253
-
SHA1
af854440e4c33fe0765ef1086a7502b742e8e0b6
-
SHA256
c49263c52ccf5f83b50e5f50e8f35c75e103fab13eec1a7780257cefa0505a3b
-
SHA512
085e260a057e5ca47e593b2fc93875b2641426c1a560aace06d0fe5ffbecbfbf8e87ed891059bb26df045719380e27daa3292125b738b916ea36cc0fd0ae6779
-
SSDEEP
768:W8jmo/AUfmmqLYWNN4WrXAmB8R+rU3aiV4/nRWTm5WBeau6od:/AUglNHrhbY31+H5sru6o
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1680ee4aa165b3a8a4df51f12545b253
Files
-
1680ee4aa165b3a8a4df51f12545b253.exe windows:4 windows x86 arch:x86
7a7803027531302026dedc7b5f6025f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
Sections
UPX0 Size: - Virtual size: 660KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE