Behavioral task
behavioral1
Sample
e0d047df7ff731bfdf1881fae926049fc602e437bf8173aab15cca909ab75747.exe
Resource
win7-20240221-en
General
-
Target
e0d047df7ff731bfdf1881fae926049fc602e437bf8173aab15cca909ab75747
-
Size
375KB
-
MD5
b2c5b8bcb0c6cbeb26acc8464281d1bc
-
SHA1
9ce011492f41a33b6b767a09e348328b4a82af4c
-
SHA256
e0d047df7ff731bfdf1881fae926049fc602e437bf8173aab15cca909ab75747
-
SHA512
00637c14abb0eefd4e11e54e9c933876dec9ec11f7849370f1b83c0ebea34bd7594c6cadf53bb45fc0b36e81168f564aca9fa222d9636325126f7b38c12d7dca
-
SSDEEP
6144:Ocm4FmowdHoSsm4FIc1/cm4FmowdHoSsiNlcJcmHYC9/jvvfwL+TLPfSRcm4FVo6:w4wFHoSl4h4wFHoS24yTgL+zfu4/FHoy
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0d047df7ff731bfdf1881fae926049fc602e437bf8173aab15cca909ab75747
Files
-
e0d047df7ff731bfdf1881fae926049fc602e437bf8173aab15cca909ab75747.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RGmXTXEe Size: 3KB - Virtual size: 2KB
BgVjthbB Size: 19KB - Virtual size: 18KB
LnmJfTDD Size: 10KB - Virtual size: 9KB
AcYsIVBF Size: 7KB - Virtual size: 7KB
zHbboKbp Size: 2KB - Virtual size: 1KB
LpfzgeIY Size: 1024B - Virtual size: 650B
meaQkxgH Size: 94KB - Virtual size: 93KB
cgImBWwe Size: 512B - Virtual size: 457B
JmoZPGDh Size: 92KB - Virtual size: 92KB
TTYrWeoQ Size: 51KB - Virtual size: 50KB