Behavioral task
behavioral1
Sample
b5d27e30eec3b6e99dec9ef598c261b5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5d27e30eec3b6e99dec9ef598c261b5.exe
Resource
win10v2004-20240226-en
General
-
Target
b5d27e30eec3b6e99dec9ef598c261b5
-
Size
159KB
-
MD5
b5d27e30eec3b6e99dec9ef598c261b5
-
SHA1
1a05d1741efd0e65a67ce968889ca0c00a6a662b
-
SHA256
492b36130f46e5c3ee0622373e764440c4356940aec138bcfa35b31950d93304
-
SHA512
9855f417b2c1f77948b1c8d20684ad6c8aa88f13d0aa6f4c561305de70fef0c3628c6188cd5fa16bb7e84794211e1d50b0784db0b203639bff266adfe71d6c82
-
SSDEEP
3072:QqxrWXRz+uZNAo6+E17Q0zhdfxXp2cPPi8sIVvhrqWqZAxMJReSJet:QCKXcCNAo4u0zZpR3i/IVtqjP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b5d27e30eec3b6e99dec9ef598c261b5 unpack001/out.upx
Files
-
b5d27e30eec3b6e99dec9ef598c261b5.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 141KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ