Behavioral task
behavioral1
Sample
20ef190a5e7945f2cb9085a6c4290a1e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20ef190a5e7945f2cb9085a6c4290a1e.exe
Resource
win10v2004-20231215-en
General
-
Target
20ef190a5e7945f2cb9085a6c4290a1e
-
Size
10KB
-
MD5
20ef190a5e7945f2cb9085a6c4290a1e
-
SHA1
834432d1326fce77f275802dce2ec11fb636fb0e
-
SHA256
b7762c69c43255eede3c962fc52cdd91ee3431f846996a5bdc4c3760ba861d65
-
SHA512
778dd28e41b862757e2594dae2bae8f23ed651731b5658d0eebf05f29d4111c9de93e43e9cf54fe7add9211ba9283bb172118ef76d55e22b33a7dc5a7d593f49
-
SSDEEP
192:vIysA/4ZJDPuuxDQNQ2spwlqZif/R/J9a+GGzD13dD+l2+D2Dg+:vIysAwZJWNNvVqZkRjNDDNdD+lBD2s+
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 20ef190a5e7945f2cb9085a6c4290a1e unpack001/out.upx
Files
-
20ef190a5e7945f2cb9085a6c4290a1e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ