Static task
static1
Behavioral task
behavioral1
Sample
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe
Resource
win10v2004-20240226-en
General
-
Target
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
-
Size
64KB
-
MD5
1119a0e6971e5c0773c780ed380c9ae5
-
SHA1
7b2ea5a52d4875caf342877befa5c1ea62e6db5d
-
SHA256
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
-
SHA512
4154d97e6973b7c6b037dd274dee90f361a7dd4378de4c26454499df24513c6aaddf9a404346360b2c566ac4e5a502c4e54e1ed47456e6d3c9d382f4af3f4b5e
-
SSDEEP
768:Y0gD04rmpLAuJGlfAHI9lqnP8q0gXg0uvsVWZz/L4i/ym23ysRaKFt9kS3DCkeI9:YNpmpkzAHkq0gXgffZgiKKsDNDCkruk
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231
Files
-
6ed57cc74fd6b6d1c0cbf3c4fe5b5beee47df148f1c8bdabbf1d3b9a17347231.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
ABC0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ABC1 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE