Behavioral task
behavioral1
Sample
e24caee2b0f7fd8c784ca25dbeae8d6e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e24caee2b0f7fd8c784ca25dbeae8d6e.exe
Resource
win10v2004-20240319-en
General
-
Target
e24caee2b0f7fd8c784ca25dbeae8d6e
-
Size
32KB
-
MD5
e24caee2b0f7fd8c784ca25dbeae8d6e
-
SHA1
f6efc5d2793ac7a82ec61d71335b0ca65da0550b
-
SHA256
9f5b65ec0dd43e8df77e2887d7695610ed3b0e62a3c706483a9cc96ec802b459
-
SHA512
d1520fffb43689a26517b039ff6e43f3481cb03285da1bf4b9543ae6a22f65719063fbb8e895dea6e78ff0b3816673e8665ecdbc049daa04bcd544e3ec7a24c2
-
SSDEEP
192:v0Oe9DJN4ilCM3niKPdKoa39VQ3qFkGPyTboF:v0Oe9DJ+oh3DPlkgqFjY0F
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource e24caee2b0f7fd8c784ca25dbeae8d6e unpack001/out.upx
Files
-
e24caee2b0f7fd8c784ca25dbeae8d6e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ