Behavioral task
behavioral1
Sample
aca2c3eaba7b2df32f47f362236a3c11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aca2c3eaba7b2df32f47f362236a3c11.exe
Resource
win10v2004-20240226-en
General
-
Target
aca2c3eaba7b2df32f47f362236a3c11
-
Size
16KB
-
MD5
aca2c3eaba7b2df32f47f362236a3c11
-
SHA1
37d17d784ce70d360406eba739f229359cf07116
-
SHA256
4ab4db6fe2fbe6d71a20c719be6a88a3dc528486bf3674066ae3610904f643ab
-
SHA512
1105aec7317531dc893005d1d60bc46679af771a6b8923b1bcaef4ffbad06ad5b1355df1434d72459cd37c0f7882399e90ea1164160594fb57b4a62e2441cb46
-
SSDEEP
384:95KUOmLuSsEU7I29OsFEWRayBc+HlgsDq6/aI:95McZsj1REymuf3
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aca2c3eaba7b2df32f47f362236a3c11
Files
-
aca2c3eaba7b2df32f47f362236a3c11.exe windows:4 windows x86 arch:x86
7a7803027531302026dedc7b5f6025f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
Sections
UPX0 Size: - Virtual size: 624KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE