Behavioral task
behavioral1
Sample
45e98e5e4991c2a2cad398536ba183b14a2ebad679828fa2c98cc32f5d468966.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
45e98e5e4991c2a2cad398536ba183b14a2ebad679828fa2c98cc32f5d468966.exe
Resource
win10v2004-20240226-en
General
-
Target
45e98e5e4991c2a2cad398536ba183b14a2ebad679828fa2c98cc32f5d468966
-
Size
128KB
-
MD5
61f9c970f1feba6fd5f3557c3acc1496
-
SHA1
79a858ab4d3270c5760970a0f9f98110ae291716
-
SHA256
45e98e5e4991c2a2cad398536ba183b14a2ebad679828fa2c98cc32f5d468966
-
SHA512
de9800a46af7dc2d69a37576dfcbbf590f800e113982f1a2acb855fe3d1edd8bf5abcddec0cea987f6c2b8650d70eee7011584f36ef71866395736f5dc4f2ed6
-
SSDEEP
3072:cGjbLl/gvQoutY1Tj4mYWR/R4nkPR/1aVuyJN9jnY4OKFGO27:xjluQoSqIo5R4nM/40yJNJYGYOE
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45e98e5e4991c2a2cad398536ba183b14a2ebad679828fa2c98cc32f5d468966
Files
-
45e98e5e4991c2a2cad398536ba183b14a2ebad679828fa2c98cc32f5d468966.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qhx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sy Size: 512B - Virtual size: 4KB