Behavioral task
behavioral1
Sample
c66ec572df08d18ba85791b6b7456a0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c66ec572df08d18ba85791b6b7456a0c.exe
Resource
win10v2004-20240226-en
General
-
Target
c66ec572df08d18ba85791b6b7456a0c
-
Size
27KB
-
MD5
c66ec572df08d18ba85791b6b7456a0c
-
SHA1
0958ebf1953fcc9f01a061203806c2a2f859520a
-
SHA256
5f21c4783e6e6385fafdb54a8fdfbf859a9f367e47592688f580bc11684e003d
-
SHA512
85a306a73b99df394988461626cd3b065f20cc049e1e481a1d5feee26a427d29570935704f3609090f312a1bf45ca060dafe3c20566618f12d2d49b1adec5267
-
SSDEEP
384:ru0ecyggBAbJ42+FkrSwC82fi5nw8flw7Evs/aPQZILm7P1cWLQpIyaKe0QAkq+f:2c/Jh+WrXblflRvvPLydya8kqMd
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource c66ec572df08d18ba85791b6b7456a0c unpack001/out.upx
Files
-
c66ec572df08d18ba85791b6b7456a0c.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE