Behavioral task
behavioral1
Sample
c4f5b8fb117ec3ca8cd9a25da958608a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c4f5b8fb117ec3ca8cd9a25da958608a.exe
Resource
win10v2004-20240226-en
General
-
Target
c4f5b8fb117ec3ca8cd9a25da958608a
-
Size
143KB
-
MD5
c4f5b8fb117ec3ca8cd9a25da958608a
-
SHA1
156e14bfdb186add1fcc89d207f77e1a005c4870
-
SHA256
e49ccd5108b8a88f359d9ddcb7bf8250a6995a5faa7eafb3a5f283f037aa4736
-
SHA512
5714a0576d1fe74db3279db6021d53d1663307d5c91a4ff3253178d69ca9f3f451378f845cee6ef14f0923f877c8e88175a0b1d2eb7e56589cdfbb2b3b10e0a9
-
SSDEEP
3072:0leoms0qZfY/ECdmgqSR6xSd2tLYITwVLXhyl4ik7cjwsu12R4+6:0lepog/Eo8pYITo1w4ik7k5Fq+
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource c4f5b8fb117ec3ca8cd9a25da958608a unpack001/out.upx
Files
-
c4f5b8fb117ec3ca8cd9a25da958608a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 137KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 991B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ