Behavioral task
behavioral1
Sample
cdd453a64a91c0ca7a993e3064dfe21e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cdd453a64a91c0ca7a993e3064dfe21e.exe
Resource
win10v2004-20231215-en
General
-
Target
cdd453a64a91c0ca7a993e3064dfe21e
-
Size
37KB
-
MD5
cdd453a64a91c0ca7a993e3064dfe21e
-
SHA1
c5b4121066eb06d83631f4cc5e057488021dd438
-
SHA256
4667081ada0d63d6efe503306f632210326fad9188a3f28dcc2e61dfe43fb5e5
-
SHA512
8b49926f10ddebbe67c1bedf586a0d628706ad8c6c2f710aba6c23519221696599dbca76a681560d3b48ae6e9b4370d16a8396764c20a98ff7ae87d54cb719e9
-
SSDEEP
768:kG7icqx70dTDf//GZv7xpyO25tkDcHoth5TG8xXqEYal8QYHc2dZdv:kNT4fnu7S35eDcHoth5TQEhl8QqcMv
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource cdd453a64a91c0ca7a993e3064dfe21e unpack001/out.upx
Files
-
cdd453a64a91c0ca7a993e3064dfe21e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ