Behavioral task
behavioral1
Sample
de6c752a702a9b9557bbc1323f61f470.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
de6c752a702a9b9557bbc1323f61f470.exe
Resource
win10v2004-20240226-en
General
-
Target
de6c752a702a9b9557bbc1323f61f470
-
Size
12KB
-
MD5
de6c752a702a9b9557bbc1323f61f470
-
SHA1
5ef39cbbc44a48c9e5f14544a4aa166147791c75
-
SHA256
f95ad7734540b3eeb8bcd10d7b4801e636d2587a7f030749df2aa8a860c69657
-
SHA512
29da3820d1c304feb46172d4b7acc4d61d025eb8cafc6898ba3e46ef2f2e8c50e6c25a307de2ef169e73357b294ec57337fd13c7b0342d05b0258bfb2acd048c
-
SSDEEP
192:JRx8qZN5EWTlXPBKmDNxF4oUU5huXGof:JjBEWTlXPLDh4pU5huX
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de6c752a702a9b9557bbc1323f61f470
Files
-
de6c752a702a9b9557bbc1323f61f470.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE