Behavioral task
behavioral1
Sample
4b3ffbc4b3ce457beb6c64f23f16ea815187649345c6385182ffc433d678b54d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b3ffbc4b3ce457beb6c64f23f16ea815187649345c6385182ffc433d678b54d.exe
Resource
win10v2004-20231215-en
General
-
Target
4b3ffbc4b3ce457beb6c64f23f16ea815187649345c6385182ffc433d678b54d
-
Size
123KB
-
MD5
0b517097ab5405730bb0976f4f8fa90f
-
SHA1
66eef2b63edc451c285b3c7fd8ace85e6d689fc6
-
SHA256
4b3ffbc4b3ce457beb6c64f23f16ea815187649345c6385182ffc433d678b54d
-
SHA512
0be029368b0d352922d08e9e543f865efdca6e51b526274b07f9201ae86c7927c23c272a6e0056ba9d7ab6f9207be6443948eb202521e2a9648fd11dce2aa7ce
-
SSDEEP
3072:t/jbLl/gvQoutSWGjwc/T6AhxqXonkwEN3:VjluQoSSDt/TfKfR
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b3ffbc4b3ce457beb6c64f23f16ea815187649345c6385182ffc433d678b54d
Files
-
4b3ffbc4b3ce457beb6c64f23f16ea815187649345c6385182ffc433d678b54d.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.g Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kxvu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.psfx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fpugn Size: 512B - Virtual size: 4KB