Behavioral task
behavioral1
Sample
4bde5a7297d9dac2b96edb6c191d2a92.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bde5a7297d9dac2b96edb6c191d2a92.exe
Resource
win10v2004-20231222-en
General
-
Target
4bde5a7297d9dac2b96edb6c191d2a92
-
Size
58KB
-
MD5
4bde5a7297d9dac2b96edb6c191d2a92
-
SHA1
f1444a875907543c200979f5e518c939e3ce97fe
-
SHA256
6b6753cedec30e6256625a7dd1d95a9767d011cb17ad34cceec115e952ae8a30
-
SHA512
d52e6f71989f4710f4756de31650720a6468dedd9730ce9d9b997c6cc42e8a640960fa0c6282372b9d6533f12fae5b694c598553264c6b906b742675dd2a2f84
-
SSDEEP
768:C/6n0eN53Eife9/x6DAu4uLtvZi6uzBWmkM1mjoXj4ZZnIq7vm1wPzyFh7vIAFN1:Cyne9/wXFtvhuzBWmkDKjudIUowZ4
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 4bde5a7297d9dac2b96edb6c191d2a92 unpack001/out.upx
Files
-
4bde5a7297d9dac2b96edb6c191d2a92.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ