Behavioral task
behavioral1
Sample
d5b177684594459f55df8288f32b90c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5b177684594459f55df8288f32b90c8.exe
Resource
win10v2004-20240226-en
General
-
Target
d5b177684594459f55df8288f32b90c8
-
Size
29KB
-
MD5
d5b177684594459f55df8288f32b90c8
-
SHA1
2a8bdc0257d8b85b908e9f20c55e9213319f636a
-
SHA256
774ea4b3b54fae65df3903b4dfde77b7f8f0976427176967db4aa3536180db71
-
SHA512
f1ec33942c7355459400322772e34ac59d143aa95b413ea718a4fedcc51d235256e6892d3a7f4276b6fcb10e3adaa208a3fe5fe9ae7dc542b79cb99b5581f52f
-
SSDEEP
768:kIGer6N89cTHntxb3oZcKpUpmaQiTb7X:ke+xDIGIniT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5b177684594459f55df8288f32b90c8
Files
-
d5b177684594459f55df8288f32b90c8.exe windows:4 windows x86 arch:x86
ea265e1fce9405dac4cbb1b5b8867377
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_tell
_tzset
_umask
_rotl
_spawnl
_stat64
kernel32
GetNextVDMCommand
GetDriveTypeA
GetStdHandle
GetSystemInfo
GetVersion
GlobalAlloc
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE