Behavioral task
behavioral1
Sample
d8d8c865860618006444a0c0718faa81d0353176e3cb60a23d4edbd21032063c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8d8c865860618006444a0c0718faa81d0353176e3cb60a23d4edbd21032063c.exe
Resource
win10v2004-20240226-en
General
-
Target
d8d8c865860618006444a0c0718faa81d0353176e3cb60a23d4edbd21032063c
-
Size
903KB
-
MD5
97dc67426422bbed2ee051e9883b8da0
-
SHA1
131ebb54ce9e2c70c980af9b94190b07b4f2d70b
-
SHA256
d8d8c865860618006444a0c0718faa81d0353176e3cb60a23d4edbd21032063c
-
SHA512
42333cb56378375b7b58bae4bef0cad996a89f592ca7af3254671be6232b38679d32783ec3a8f505b7dec1a622386c3fc3a2166ed71ef65cf636e46bb1c38f17
-
SSDEEP
24576:YoENuw9DNM0xCIWhih1LOHQe3Lq0e/0Bo:XEYwJ20xCIWAhNOHpDex
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d8d8c865860618006444a0c0718faa81d0353176e3cb60a23d4edbd21032063c
Files
-
d8d8c865860618006444a0c0718faa81d0353176e3cb60a23d4edbd21032063c.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ktlju Size: 4KB - Virtual size: 4KB
.wu Size: 512B - Virtual size: 4KB