Behavioral task
behavioral1
Sample
4c6508cb27eb0c3b596d928b722a6fcc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c6508cb27eb0c3b596d928b722a6fcc.exe
Resource
win10v2004-20231215-en
General
-
Target
4c6508cb27eb0c3b596d928b722a6fcc
-
Size
12KB
-
MD5
4c6508cb27eb0c3b596d928b722a6fcc
-
SHA1
07ec3ea3c0f68d89b261006549ae26954d5a840d
-
SHA256
e8e66becb9a79d9857c270a3e28ba76084bcb0b7e9cd8c7a874c3062656ec919
-
SHA512
02f4965e801d889b8454527b8a4ea1766f57721bc6b537bfd2a39c5ae085e02d60e82ee57ae6278cac33b0f2c2bcb9bdcdceb38d05a90469e81f327ad0a5fd66
-
SSDEEP
192:GtsGTMe4G0r4bNOuHB3u8+calYVwT/VIwZYk8Q9poWpLgeWb8bltoGci64:GtsGTKG0cEuHB3B+calEDwZlpoWpL087
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 4c6508cb27eb0c3b596d928b722a6fcc unpack001/out.upx
Files
-
4c6508cb27eb0c3b596d928b722a6fcc.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE