Behavioral task
behavioral1
Sample
3bc9e6e6501d7fd3a4d3e36e6ab086a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3bc9e6e6501d7fd3a4d3e36e6ab086a5.exe
Resource
win10v2004-20231215-en
General
-
Target
3bc9e6e6501d7fd3a4d3e36e6ab086a5
-
Size
7KB
-
MD5
3bc9e6e6501d7fd3a4d3e36e6ab086a5
-
SHA1
964ff6840153bbf081a1f8683b60757b2e113f6d
-
SHA256
f8e1852d337e460945661d20f5015009b99e07671b6bb30a1f5801e6ea6ee22c
-
SHA512
20961f8c8a37af3534bd5346bb3206a7bb549e08012ebaecf60e7a09dcd909ac38a992a5d5375ee036152701291717d8513379f9f56cab267b5e393da0252654
-
SSDEEP
192:xaXNKIW7fZj1OJ6NYZdy2x7ZOR/jwjcXB+R:x4ZW7Bj1jNYby2xYq4kR
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 3bc9e6e6501d7fd3a4d3e36e6ab086a5 unpack001/out.upx
Files
-
3bc9e6e6501d7fd3a4d3e36e6ab086a5.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE