Behavioral task
behavioral1
Sample
573b036038f1a6e4d224ff1a9d9cf0fc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
573b036038f1a6e4d224ff1a9d9cf0fc.exe
Resource
win10v2004-20231215-en
General
-
Target
573b036038f1a6e4d224ff1a9d9cf0fc
-
Size
23KB
-
MD5
573b036038f1a6e4d224ff1a9d9cf0fc
-
SHA1
93eed6707ffc02308029b32b6d837d9a3a0fd749
-
SHA256
823ec10d297fb0db8f91544e038f20ba84820ff0da102db3327339ca4e4313bf
-
SHA512
0cdb6b213ca676e09d0e41235c3f9669d018d57a524e7cc3259736ec92b83295141eb67f646498a2424cb170bfa74f6ea82842037a15c509ae5d85861e7e373a
-
SSDEEP
384:qhsCiktaPVFfJGRiW4ynt3wuZOU3IdxnFB9HTarH+GtBfjDxVvo/q4RWz:qhsbo0FRGkvoVwuExnFbH8j3vo/qk
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 573b036038f1a6e4d224ff1a9d9cf0fc unpack001/out.upx
Files
-
573b036038f1a6e4d224ff1a9d9cf0fc.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ