Behavioral task
behavioral1
Sample
c89aedb68ce107626e0312928214efd3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c89aedb68ce107626e0312928214efd3.exe
Resource
win10v2004-20240226-en
General
-
Target
c89aedb68ce107626e0312928214efd3
-
Size
10KB
-
MD5
c89aedb68ce107626e0312928214efd3
-
SHA1
5b48b13b828779dcc927838ca2bdcd3f1b8a8536
-
SHA256
cca4fad30546b1681c2853e19e9b8fa01d2bb71216dd0636e494bfab7ff5cf99
-
SHA512
378aa91b4490e63745d87bda3827c1579262ab99169b027eea30a9311cc69e8af81b123bce32d82add843f4ce4b1e91241a27c9783f59bf98f10047aac8687e5
-
SSDEEP
192:I1Cy+dKfhEZTbADsYB3OOvsEKJGlTSA35991qn28yCtRWI8n7W2EwWkj2EBHGfdT:IoZ8fzDj3OOkFElTS0LGnVAWU24TLS
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource c89aedb68ce107626e0312928214efd3 unpack001/out.upx
Files
-
c89aedb68ce107626e0312928214efd3.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.code Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE