Behavioral task
behavioral1
Sample
9137159160a9f84a6983dd05668cfc3100003d55301ad184b1313127b06a2c0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9137159160a9f84a6983dd05668cfc3100003d55301ad184b1313127b06a2c0c.exe
Resource
win10v2004-20240319-en
General
-
Target
9137159160a9f84a6983dd05668cfc3100003d55301ad184b1313127b06a2c0c
-
Size
266KB
-
MD5
e3e428054fbb0ac813d33336699fc5ec
-
SHA1
9b1642a991117d4c24b16c4b2a927f09f7b5aef9
-
SHA256
9137159160a9f84a6983dd05668cfc3100003d55301ad184b1313127b06a2c0c
-
SHA512
e8f6539de521f6def10bdde707ee80505863795fc4c59e99f2058bb5a550c4692fcbc2df276508c4c76d0bea0f056e74178e8f56930a290a04f436e8ab655322
-
SSDEEP
6144:sPDLCL9Io5R4nM/40y37Ysxio/w3leWj8ZFfUMzHL1XH+gb:sPKLXq/7vioc0WnMzr1Xegb
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9137159160a9f84a6983dd05668cfc3100003d55301ad184b1313127b06a2c0c
Files
-
9137159160a9f84a6983dd05668cfc3100003d55301ad184b1313127b06a2c0c.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tn Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.f Size: 512B - Virtual size: 4KB