Behavioral task
behavioral1
Sample
47192571a6f13e4c2a189c8d5bd00fe1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47192571a6f13e4c2a189c8d5bd00fe1.exe
Resource
win10v2004-20231215-en
General
-
Target
47192571a6f13e4c2a189c8d5bd00fe1
-
Size
125KB
-
MD5
47192571a6f13e4c2a189c8d5bd00fe1
-
SHA1
2e19d602b681c1e6429341a5247b782d49b28d28
-
SHA256
4ec6246146149e0c010cbb82cb54fb62b67722dcd84809fd67d16f8beb8cf73e
-
SHA512
806e9dbf453f7552bd1a2959b2bf6da25a5e7d5dc2af36d18b53c5530dc3e88c701eb8a31b981f3d0bb9f4135cea854f6598949407df64737e5e34b855cbd2ef
-
SSDEEP
3072:qH2+9gVgD7aIvKoMMlaUrCZWqtCxW7iq0lyK+r5L6kVP6h:aI2aPMl5eYqtMqGArN6h
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 47192571a6f13e4c2a189c8d5bd00fe1 unpack001/out.upx
Files
-
47192571a6f13e4c2a189c8d5bd00fe1.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 240KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 120KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ