Behavioral task
behavioral1
Sample
c269ea039a336900b43175e861ed73ef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c269ea039a336900b43175e861ed73ef.exe
Resource
win10v2004-20240226-en
General
-
Target
c269ea039a336900b43175e861ed73ef
-
Size
11KB
-
MD5
c269ea039a336900b43175e861ed73ef
-
SHA1
13b072058122cbaae793f587b0ffd86ab3815fa0
-
SHA256
847c93e33ba844cb645faeb7b434c1571da95e0d7f39eeb6ae7378676ab38fc1
-
SHA512
d411ab716b9d1db12d23391ca9e2e1cb22a33874fae8a5fa016fcaf6669cb6b1fa62355b7f49c8ff7f6ab982becb0b5046a343084905da652a6baed43b56d29d
-
SSDEEP
192:rNK8khnNDq+Ifq0gR3yrLWLKxAZHT7UoK0aY7oEwJ:4hnN2/BggraLKxAsoKjolO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource c269ea039a336900b43175e861ed73ef unpack001/out.upx
Files
-
c269ea039a336900b43175e861ed73ef.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ