Behavioral task
behavioral1
Sample
28c675ef4fbbb794337aebeb14aece83.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
28c675ef4fbbb794337aebeb14aece83.exe
Resource
win10v2004-20240226-en
General
-
Target
28c675ef4fbbb794337aebeb14aece83
-
Size
228KB
-
MD5
28c675ef4fbbb794337aebeb14aece83
-
SHA1
85f1a07b25dac12564cc94c86a281c8d826773e9
-
SHA256
2fdb81c37a836e496c6b376cc0c5bc8d0c572a1895bef8dfb27eab911c67c4d7
-
SHA512
eae326514e3ec9006a2ebffcc58faa8ffc0853e603afc94c380acf6dbf0a23fc58e3c5171bf8e9dc969d0be0bbe5c1ba7789e50f1fc0517404c83ddef3f7c75c
-
SSDEEP
192:0iHqwd7EK+IDuKEjly6Dz1zmFq+ee7xQsdOPT5ddjeWKVQ5ry:0iKw+Quvly8pzCqNzsd5WKV+ry
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 28c675ef4fbbb794337aebeb14aece83 unpack001/out.upx
Files
-
28c675ef4fbbb794337aebeb14aece83.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE