Behavioral task
behavioral1
Sample
2c2f123c703f4ab545e1b4cc824ff33e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c2f123c703f4ab545e1b4cc824ff33e.exe
Resource
win10v2004-20231215-en
General
-
Target
2c2f123c703f4ab545e1b4cc824ff33e
-
Size
12KB
-
MD5
2c2f123c703f4ab545e1b4cc824ff33e
-
SHA1
719bdc1d6c696f597ffc12a610592b165f86a592
-
SHA256
9db4d9e49379c850626521ac132548215df9ba80a993bc818f35fc1dedce7854
-
SHA512
834eba47e60c46805cb875863285ce35844a4e092fdff14c2b72fb1b734cf8adf63cd429bc59ae089bf058d7bcf97dd781413e21f264fa8c46933f6460bee2c1
-
SSDEEP
192:pTY7GB52N3FXraGGEznCv08zRZ+MpmesL8PMOsMLPQ13jVPpPcz4IH8+:pTY7Gj2NrCv7f+MFPXP43Dv+
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2c2f123c703f4ab545e1b4cc824ff33e unpack001/out.upx
Files
-
2c2f123c703f4ab545e1b4cc824ff33e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ