Behavioral task
behavioral1
Sample
c188f79d49c647ecf3a219370499a8d1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c188f79d49c647ecf3a219370499a8d1.exe
Resource
win10v2004-20240226-en
General
-
Target
c188f79d49c647ecf3a219370499a8d1
-
Size
23KB
-
MD5
c188f79d49c647ecf3a219370499a8d1
-
SHA1
4c4ae81d1955c0baa894a4e058a3b818406ffe47
-
SHA256
e722ce3ad6d10a60cc9285550397bc62c592512df25c2539a6375fc4da02d140
-
SHA512
63a32162be0e59844d2f381d89f9428c63f5e964e84756560ec3e80b57408cdb181d5e53be8b1a711a199e7d957139df30766deb181aff999b9bfb07984f4806
-
SSDEEP
384:a5pWLDwo8fh/qvV4NWgXL+rKSKF9Tbd+Ulv2Vohwl02AdSXfDA:aPWN4wgX6rwF9f5lDhwl02wSP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource c188f79d49c647ecf3a219370499a8d1 unpack001/out.upx
Files
-
c188f79d49c647ecf3a219370499a8d1.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE