Behavioral task
behavioral1
Sample
2615c0ad7a56beca7ff1a185c509d514.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2615c0ad7a56beca7ff1a185c509d514.exe
Resource
win10v2004-20231222-en
General
-
Target
2615c0ad7a56beca7ff1a185c509d514
-
Size
51KB
-
MD5
2615c0ad7a56beca7ff1a185c509d514
-
SHA1
8f4ee925d63a55f06a99cbc76c45a1c96d5ccf82
-
SHA256
f797dfb106c93922cb50020f531219e8939c51146bc1a444132afbbee554afb4
-
SHA512
c6d90af9afc7d1e2312e1dd4ebd742568c1acd55d3b7480dd5633b25212274d8afa381a58a2813ab464079d7d3a47c71efa09e2bdeb3a466d9dd70caf047e602
-
SSDEEP
768:atqcX8GV6RdZLlWHBtDA5S0YtMFy0gfs41PDK2SIwMjavQ1ZuluKvxT5GGoBocbv:atqcX88BSMdDPSIwMjATld5GGiNWBRS
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2615c0ad7a56beca7ff1a185c509d514 unpack001/out.upx
Files
-
2615c0ad7a56beca7ff1a185c509d514.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE