Behavioral task
behavioral1
Sample
df7787e16c2a7e62f9326f3f2f484c53.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df7787e16c2a7e62f9326f3f2f484c53.exe
Resource
win10v2004-20240319-en
General
-
Target
df7787e16c2a7e62f9326f3f2f484c53
-
Size
123KB
-
MD5
df7787e16c2a7e62f9326f3f2f484c53
-
SHA1
3b5adbc264d4d61f530cc939d32f47c1883c73d6
-
SHA256
45c4f70ca08c99feb25d8e326282b2d0a9e869869fa762623f7f2ff473dfd1ed
-
SHA512
9531fc6f032750cebcd9756b7bec6adc9aff7913ab46de3d2fa0c4e88552c08498039d0bef34e9bc88343cd834f63d1f5f3a9e76ec9ec803bd60c0fc042f6078
-
SSDEEP
3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLajk4:OVYrJrOSsRwcp2k4
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df7787e16c2a7e62f9326f3f2f484c53
Files
-
df7787e16c2a7e62f9326f3f2f484c53.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
42vab535 Size: 62B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oqvrztrg Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ