Behavioral task
behavioral1
Sample
2845bf5732c56b872ca0e3553e85d882.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2845bf5732c56b872ca0e3553e85d882.exe
Resource
win10v2004-20231215-en
General
-
Target
2845bf5732c56b872ca0e3553e85d882
-
Size
81KB
-
MD5
2845bf5732c56b872ca0e3553e85d882
-
SHA1
1dd0751af5ffd5d7f471ec8b26aa4f1713754b4f
-
SHA256
818f37fd4fd41406ab98c1e2fbbeb250c55303000e385e3b8990a28412ef64f6
-
SHA512
89f6c3b650060d8334dd4e599cb42c31e12ec7aaacdec41372cd28d574fb0b3cc6d5bd297323c64458061306da4324fce23c900ba78397a455e25e7393ebf7d8
-
SSDEEP
1536:32S7YSqYcxthuQheX0EVaLazUiiElnuGFu3EpyAmqG7VeCl8L1sO:32ScO6hedMSiElujVAmqS8Cl8L19
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2845bf5732c56b872ca0e3553e85d882 unpack001/out.upx
Files
-
2845bf5732c56b872ca0e3553e85d882.exe windows:8 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:8 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 349B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ