Behavioral task
behavioral1
Sample
Windows Loader.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Windows Loader.exe
Resource
win10v2004-20231215-en
General
-
Target
4084e4958ab743c1a81c3d779507518f
-
Size
1.7MB
-
MD5
4084e4958ab743c1a81c3d779507518f
-
SHA1
8726ec7be43809d459dd914cc51aeb9a2ac36cda
-
SHA256
ffcc94bae033dcebd178abc47798cba540ca2bfb9429db435566a121e2a2f19d
-
SHA512
879588ea66e531b5886dcb090d8c9ba05408b4297d9e028fb06d34a5153f092254e07035af8f51e4e78749697bf937f55740daf7b9a8856c2664de02ec778e33
-
SSDEEP
24576:ThePtVqWaoUGIqLtDDEzj9saOAHTjaUZt+YeKAee/Y0vbOWGoQsnlwF92uOqEnOG:tk0iDE9sZAzR+LKA3fOWG4lwFgPHOYh
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Windows Loader.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Windows Loader.exe
Files
-
4084e4958ab743c1a81c3d779507518f.zip
-
Keys.ini
-
Read me.txt
-
Windows Loader.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 577KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
checksums.md5