Behavioral task
behavioral1
Sample
bdb9c4aaf5ae5df30404c19de3cd9a3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bdb9c4aaf5ae5df30404c19de3cd9a3b.exe
Resource
win10v2004-20240226-en
General
-
Target
bdb9c4aaf5ae5df30404c19de3cd9a3b
-
Size
319KB
-
MD5
bdb9c4aaf5ae5df30404c19de3cd9a3b
-
SHA1
aab616028eb1fe4c822b6826256b5e9c0b5379d7
-
SHA256
de1cd8172400ec290a8895bcf7a41b74826435f51200c708c96d3371b115bbc8
-
SHA512
274c0ffad42fd7c2c95cad316ec2d46b4931cda617f22731379bb84b574a63013a255fec2aca011878086a1b0570b12cacd1f1509c4c0c14cb1f7e101e21c177
-
SSDEEP
6144:IbIzTZqQ90/F1EDBJH+foAxtCbjF9K2kuSE/v6N+3nrX82092AC:IbIxqQq/7YJ2rTAuAdgorX82097C
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource bdb9c4aaf5ae5df30404c19de3cd9a3b unpack001/out.upx
Files
-
bdb9c4aaf5ae5df30404c19de3cd9a3b.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 124KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 315KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 278KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ