Behavioral task
behavioral1
Sample
296f6ab9c1e74fd61df8b0a4dff7361a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
296f6ab9c1e74fd61df8b0a4dff7361a.exe
Resource
win10v2004-20231215-en
General
-
Target
296f6ab9c1e74fd61df8b0a4dff7361a
-
Size
286KB
-
MD5
296f6ab9c1e74fd61df8b0a4dff7361a
-
SHA1
ae9a3332eaff0ca17ef61b4b304d1a61e9c8e991
-
SHA256
c33a94e4a2db873c6c57508e2b30905c162d6ab1eeaf9560e843b7fb79cc4eb5
-
SHA512
423e59aee191ac6e543c737f51c017a32f12d3eb5cc564c979b67a739b7190bb0aa2300e80e021b541dbecc093ab8801bb7f9cb1cd63efd0412f2581adaaad29
-
SSDEEP
6144:GglaWr7/LNX32YooMkOY7QtnIOpehuQt+55+ryePZN0UNr:GTC7xH2YVnv7QFfpepY5+wUl
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 296f6ab9c1e74fd61df8b0a4dff7361a unpack001/out.upx
Files
-
296f6ab9c1e74fd61df8b0a4dff7361a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 688KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 258KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 864KB - Virtual size: 865KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ