Behavioral task
behavioral1
Sample
686f7863b77fc1d1d31e5b48a972a3ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
686f7863b77fc1d1d31e5b48a972a3ba.exe
Resource
win10v2004-20231215-en
General
-
Target
686f7863b77fc1d1d31e5b48a972a3ba
-
Size
255KB
-
MD5
686f7863b77fc1d1d31e5b48a972a3ba
-
SHA1
4182acc67787e7fe10190b11c3890d83d32edfa3
-
SHA256
0ec55942be2dd120e058b67f498b6b858183ed9c203b2481bb383ecdcf07681a
-
SHA512
6e830ee524eeff0fdd7316573242274550ca376d0c9b5514e2301f27c3a29a6c5108b2d9dd2b9c07fbfbe80355c68ed3fe765cc01630e042c5b8dae5b31eb26a
-
SSDEEP
6144:cBABAdbouCA9dctS6HrFGDrbyyu6vzTr5dNKTToAH6s:cmB0OCW1gDpu6nrcVas
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 686f7863b77fc1d1d31e5b48a972a3ba unpack001/out.upx
Files
-
686f7863b77fc1d1d31e5b48a972a3ba.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 488KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 247KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 530KB - Virtual size: 529KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ