Static task
static1
Behavioral task
behavioral1
Sample
1407a5c3f09ca66824085f6792aaa4200038a09e24b06fd5843f56b6ec2b657a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1407a5c3f09ca66824085f6792aaa4200038a09e24b06fd5843f56b6ec2b657a.exe
Resource
win10v2004-20240226-en
General
-
Target
1407a5c3f09ca66824085f6792aaa4200038a09e24b06fd5843f56b6ec2b657a
-
Size
382KB
-
MD5
8a028410d6c9424df8538bff6cd9d5eb
-
SHA1
c0f2ba7359da2178f866fb1f190cbdcc875d1b54
-
SHA256
1407a5c3f09ca66824085f6792aaa4200038a09e24b06fd5843f56b6ec2b657a
-
SHA512
11ccf2bf885bc47df3959ee826447c5fa435d48ec88e08ff07b402526e82692b6203e3d7030151e263964a740c629e868da6eabf950bc32f1abde66c1b76f663
-
SSDEEP
6144:CqppuGRYx4H712f/SBTpzZA6rXD40b+7TJDAMycMo:CqpNtb1YIp9AI4FDAMycV
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1407a5c3f09ca66824085f6792aaa4200038a09e24b06fd5843f56b6ec2b657a
Files
-
1407a5c3f09ca66824085f6792aaa4200038a09e24b06fd5843f56b6ec2b657a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
NDltoTPW Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tJrdyPER Size: 177KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE