Behavioral task
behavioral1
Sample
631fb43f5c0afd0e27e4ecf82bf7707e21ee077d1f5be8370281e51900ea350a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
631fb43f5c0afd0e27e4ecf82bf7707e21ee077d1f5be8370281e51900ea350a.exe
Resource
win10v2004-20240226-en
General
-
Target
631fb43f5c0afd0e27e4ecf82bf7707e21ee077d1f5be8370281e51900ea350a
-
Size
196KB
-
MD5
69b584c3558c176d0861592d74919b22
-
SHA1
c11e023c99e04c88cec8934be45f3bb0dec001c4
-
SHA256
631fb43f5c0afd0e27e4ecf82bf7707e21ee077d1f5be8370281e51900ea350a
-
SHA512
1654791b00c00809cc80fdf400cafce10f0cd39d883d5d1cd87a7f6df57546a4aad649f01a7b6f63ec36709481ba9550b40ea9bc13b130698575f8ded41104c3
-
SSDEEP
3072:ZOgUXoutNFxZVX4/awxfodLJUBv9Bsor1rHjhMU9npQQpmuG:ZFYoSPRARoYlld9n2Qpmx
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 631fb43f5c0afd0e27e4ecf82bf7707e21ee077d1f5be8370281e51900ea350a
Files
-
631fb43f5c0afd0e27e4ecf82bf7707e21ee077d1f5be8370281e51900ea350a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE