Behavioral task
behavioral1
Sample
4c0fc49f351325103f55863db133a8d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c0fc49f351325103f55863db133a8d0.exe
Resource
win10v2004-20231215-en
General
-
Target
4c0fc49f351325103f55863db133a8d0
-
Size
1.8MB
-
MD5
4c0fc49f351325103f55863db133a8d0
-
SHA1
73f9748bf4b429d9f8b5639eefe11887381a9423
-
SHA256
379d799d70bd18e2c81f43cf486160b6db9004f807b5657b212093d7648d82b1
-
SHA512
7c9677b4dcc53ba47b27815a9ac5da82361a86899747ae42659ee170573d3a449ef6170ba57aaa23104f382f3943ce5a87ae737e75edc4a7d11e9509cdced461
-
SSDEEP
49152:hOb2M58SzXir6jTMtWlEdlTqBZuaOy/p081wXU9jW2Zlkg:+n8SDiWIt7jTqrT/pXCXU9q2Zl
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c0fc49f351325103f55863db133a8d0
Files
-
4c0fc49f351325103f55863db133a8d0.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE