Runed
Behavioral task
behavioral1
Sample
03ab076ba146d90323517572cff34740a1ae6517f723633b11f7fbdce574ee60.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03ab076ba146d90323517572cff34740a1ae6517f723633b11f7fbdce574ee60.dll
Resource
win10v2004-20240226-en
General
-
Target
03ab076ba146d90323517572cff34740a1ae6517f723633b11f7fbdce574ee60
-
Size
81KB
-
MD5
ad8676fa05b159408107652a7f2ee194
-
SHA1
463c89ab1e17184287a4449a3762fe20e90763cb
-
SHA256
03ab076ba146d90323517572cff34740a1ae6517f723633b11f7fbdce574ee60
-
SHA512
d81f6922168727d7358a9a0cd46682edd86f6bf48b230a7c86a421b92787028e7ed021b317bf3e8700b9dc62c02cff0d05d7f1258c8bf8b707236338538f2c1c
-
SSDEEP
768:IQK9XOHKauKlHg5LMWFRlPPg5dtJICnCISMcWNxXQPFpgV:RK9UKTKlHg5LMWPl3kP+CC58X
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03ab076ba146d90323517572cff34740a1ae6517f723633b11f7fbdce574ee60
Files
-
03ab076ba146d90323517572cff34740a1ae6517f723633b11f7fbdce574ee60.dll windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Exports
Exports
Sections
UPX0 Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE