Behavioral task
behavioral1
Sample
8a2a6159825f1f7ac33552282c43ff91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a2a6159825f1f7ac33552282c43ff91.exe
Resource
win10v2004-20231215-en
General
-
Target
8a2a6159825f1f7ac33552282c43ff91
-
Size
5KB
-
MD5
8a2a6159825f1f7ac33552282c43ff91
-
SHA1
b627790d30bf42a0f62e4ee0c3e8efb1fe102cdb
-
SHA256
21cc6fd4489a52037b632e35d52bfa38c4f42e7c95181878c85bb69e2ad23de5
-
SHA512
fe9c67717e735ba74c0721a26287b0eacf69f68e07a2f810f3c0acbf3eb8de9e0da2f5ed27c794534c7ff7e7976acbbcb0c53bc694ee0fa8ee03927893edc5f2
-
SSDEEP
96:wDxNLtuH/N1YdG7UTacI8Xm+mdromKvRIi7UEz13WjoE/F5fbyM2SbjRYo:yLSGdE58XVcElZGEz1rEtlyM2Snt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 8a2a6159825f1f7ac33552282c43ff91 unpack001/out.upx
Files
-
8a2a6159825f1f7ac33552282c43ff91.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE