Behavioral task
behavioral1
Sample
66f18b1654a54298a9acebf96ae8a0ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66f18b1654a54298a9acebf96ae8a0ee.exe
Resource
win10v2004-20231215-en
General
-
Target
66f18b1654a54298a9acebf96ae8a0ee
-
Size
167KB
-
MD5
66f18b1654a54298a9acebf96ae8a0ee
-
SHA1
7e02e7b667097561ecbdf30e5f6aeba11b0afe30
-
SHA256
a3248175ec6d8d4e4744ada920267bb98d1c28b1e98e29068307ecbbf8640df7
-
SHA512
c15c5278b0465f2aaaa8f7d2c4df94ed649bfbfefc4e1a51a7aad9f147e8e8769545dcc4f1b7e52193afb0b1b6af7663a8edcc903f232161e544bc8fd6e7851e
-
SSDEEP
3072:eNQ2VHY5woIgzNO/Y6rdJ5z80iwo/Vcfyo4kId/nExaGo0Z5t:0Q2V4pTzNLeAwcxnExL9Z
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 66f18b1654a54298a9acebf96ae8a0ee unpack001/out.upx
Files
-
66f18b1654a54298a9acebf96ae8a0ee.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 273KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 617B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ