Behavioral task
behavioral1
Sample
8852b387daca64b0d1ed3e729740eeaa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8852b387daca64b0d1ed3e729740eeaa.exe
Resource
win10v2004-20231215-en
General
-
Target
8852b387daca64b0d1ed3e729740eeaa
-
Size
19KB
-
MD5
8852b387daca64b0d1ed3e729740eeaa
-
SHA1
f3926f000e5a56983a854d5d7b486276d622a125
-
SHA256
6bdc469e8ef53d51be271deba7bcfdeb84a1cf167d64fd79d3dd2be93bc8b5c7
-
SHA512
e76a3eb83fa9be70e467053816766a611975d4854f08f5b35d4dc7ea983534bf4a9884d9075bbeaa71160aacbf8a7f700bd609e6c4722e46c1e54ef19863b353
-
SSDEEP
384:mN+UM4XotWgqd6KYt1Ipf8ooDv1EUD4+01IhXQb2kqDgDW7lV:mN+ZIotW7YXtMf5YNt4x+hXa2RkS7lV
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8852b387daca64b0d1ed3e729740eeaa
Files
-
8852b387daca64b0d1ed3e729740eeaa.exe windows:4 windows x86 arch:x86
d76f4237a8ae158292f09835997a1d9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX2 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ