Behavioral task
behavioral1
Sample
223aea93f38b5000a2778d424d4052c6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
223aea93f38b5000a2778d424d4052c6.exe
Resource
win10v2004-20231215-en
General
-
Target
223aea93f38b5000a2778d424d4052c6
-
Size
9KB
-
MD5
223aea93f38b5000a2778d424d4052c6
-
SHA1
1537a8f6ce96c6f414cf0ccd16a94448f08ca82c
-
SHA256
b1c504d1de1f47d3bd50483b2ed9ef32bf0780829e9f77a5047330d8c8cc1811
-
SHA512
e3e78fe68889d4986d9908a5d6234cb99db1aa1dd70c22e2a2bbaab5794c7ed4a3058068e2911a43b96f08dbb1db79f7e29955e535d422000222747e05dc28f0
-
SSDEEP
96:n7YbTUBU6AxxHx570a42rEqxbrhbHt2n7RUkl72OWTS6JAcX9ORtAa:7YUBglx57QcrhTt2n7aktWvSctORd
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 223aea93f38b5000a2778d424d4052c6 unpack001/out.upx
Files
-
223aea93f38b5000a2778d424d4052c6.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ