Behavioral task
behavioral1
Sample
1390dbf1301bcb146ede636b84a0250ad13af3822909e40f9187f5dcb6d12ca0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1390dbf1301bcb146ede636b84a0250ad13af3822909e40f9187f5dcb6d12ca0.exe
Resource
win10v2004-20240226-en
General
-
Target
1390dbf1301bcb146ede636b84a0250ad13af3822909e40f9187f5dcb6d12ca0
-
Size
1.1MB
-
MD5
1f6c8239ab9088e2a4bdf6690f90a08b
-
SHA1
25dbbd58a3aa2c20caf469b48f28d19fe714bc7a
-
SHA256
1390dbf1301bcb146ede636b84a0250ad13af3822909e40f9187f5dcb6d12ca0
-
SHA512
dd2636eea4632b6768f10b375dba6dba9b1e56230053e397c11da6c1053c24a5b7778d13352c7fb397957c23044c12f0f18523f2fc3bc9f6ea681ec2435cbc0c
-
SSDEEP
24576:sSLx3hHbmrURg8VeeWzytNy1AELxdpI525rHVKqW+RbwT:s+RbmryneotNUAEL7025vW+ST
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1390dbf1301bcb146ede636b84a0250ad13af3822909e40f9187f5dcb6d12ca0
Files
-
1390dbf1301bcb146ede636b84a0250ad13af3822909e40f9187f5dcb6d12ca0.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tn Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.f Size: 512B - Virtual size: 4KB