Behavioral task
behavioral1
Sample
b6062c0fc12b4b95639e8917c2657010.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6062c0fc12b4b95639e8917c2657010.exe
Resource
win10v2004-20240226-en
General
-
Target
b6062c0fc12b4b95639e8917c2657010
-
Size
21KB
-
MD5
b6062c0fc12b4b95639e8917c2657010
-
SHA1
d6c3f56ac4e87965267600e62b97bc6b9eb2ad26
-
SHA256
d51b1260fe431cb54b41ed0d3996a7d58054db8636d543715c3e398485743d3a
-
SHA512
aeea6c197eb0694b3d9bfc4ffae4effe6b1f11b0aadd9fed0770881d60bce152fc0f0480ca26ed306c99881f6d3f2f17e5c0912948ac951c0b9abfcb7c9e4043
-
SSDEEP
384:TD6ekWSrmW5c9OPs/ilmtSLUJ9Q0Q3LRMlV+LbgmBGbE9GzhAjaAf:qFdKW5c9OPs/VtS8o2lYgE6iK/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource b6062c0fc12b4b95639e8917c2657010 unpack001/out.upx
Files
-
b6062c0fc12b4b95639e8917c2657010.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ