Behavioral task
behavioral1
Sample
44ee0734586f4a21eed447365f7a993d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44ee0734586f4a21eed447365f7a993d.exe
Resource
win10v2004-20231215-en
General
-
Target
44ee0734586f4a21eed447365f7a993d
-
Size
85KB
-
MD5
44ee0734586f4a21eed447365f7a993d
-
SHA1
b0f4c2619a3909b63443c825567c5316c588cd7c
-
SHA256
1b9517295ef57843d57fd02c012c045b5c510740db0e6beeba2b428d9083df42
-
SHA512
89049362c5985a974198b01eb1da21951d0a4144c942d568c825e7db45e9cc87a44e8ad6b013095743f0386e9f3d65106bcadf721a280b5b78a042829b7e6a5a
-
SSDEEP
1536:x9fX5CG7RiobRtZGYlLL0hejJ+luAfI3La0sq9G0OjEv42YnmXnob:f8GthtZp5w0jJ+0II3LT9G0ONZwnS
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 44ee0734586f4a21eed447365f7a993d unpack001/out.upx
Files
-
44ee0734586f4a21eed447365f7a993d.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ