Behavioral task
behavioral1
Sample
0ec6172ae503f20274dfac3c4da22b689d16149346c77009386d74486485b77b.exe
Resource
win7-20240221-en
General
-
Target
0ec6172ae503f20274dfac3c4da22b689d16149346c77009386d74486485b77b
-
Size
77KB
-
MD5
b1a6b9f126968a672bf12a69603c3ae9
-
SHA1
279fc5b1d28d19150e30a598a31bffb65de7236a
-
SHA256
0ec6172ae503f20274dfac3c4da22b689d16149346c77009386d74486485b77b
-
SHA512
0ae7a445377a283c6d46690f8269877b1ed4b27297b042570bb8e776bd8a631848965adb4aa329b42f9de5deceaec7f025f481f4d7bde6de9cba27524e90a4f1
-
SSDEEP
1536:zvQBeOGtrYS3srx93UBWfwC6Ggnouy8iT4+C2HVM1p6T5:zhOmTsF93UYfwC6GIoutiTU2HVS6d
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ec6172ae503f20274dfac3c4da22b689d16149346c77009386d74486485b77b
Files
-
0ec6172ae503f20274dfac3c4da22b689d16149346c77009386d74486485b77b.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE