Behavioral task
behavioral1
Sample
21124a9431dffeb29a0509133c2bd8c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21124a9431dffeb29a0509133c2bd8c3.exe
Resource
win10v2004-20240226-en
General
-
Target
21124a9431dffeb29a0509133c2bd8c3
-
Size
211KB
-
MD5
21124a9431dffeb29a0509133c2bd8c3
-
SHA1
b3727ae39fe6c56a2683107d92475821179c01b2
-
SHA256
8400ee9ea19e0b224246ee1f4b7e137685e91fe6d704c6cc97bd58df8d0b7b33
-
SHA512
5c8547229ceb5d17f33641e7e224767490887c69eb238bad8883339aefbfcb7ffa62a0acaae93e9582f8c027a4bb20702bd7ebef9efb47623fb70e7200648e30
-
SSDEEP
3072:BdEUfKj8BYbDiC1ZTK7sxtLUIGWCQPCBCkjTS4V4JqaEu3EwrtJgYCA2SWD:BUSiZTK40OOOu47rTJCA2SWD
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21124a9431dffeb29a0509133c2bd8c3
Files
-
21124a9431dffeb29a0509133c2bd8c3.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 496KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ndata Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ