Behavioral task
behavioral1
Sample
1b9a4a9c986d2bae1198c2fa3d8c344ae271dd2e1c72ac84787722a05d33d384.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b9a4a9c986d2bae1198c2fa3d8c344ae271dd2e1c72ac84787722a05d33d384.exe
Resource
win10v2004-20240412-en
General
-
Target
1b9a4a9c986d2bae1198c2fa3d8c344ae271dd2e1c72ac84787722a05d33d384
-
Size
1.6MB
-
MD5
4119ec641fb32ee7164311ead57eab89
-
SHA1
edbc0db5cd1b22192586d86515ffb5651f67df4c
-
SHA256
1b9a4a9c986d2bae1198c2fa3d8c344ae271dd2e1c72ac84787722a05d33d384
-
SHA512
f73a38746e03db0ece97f242ba90a023dba747b9a6b054a3a2c253cb01cc2e38d8c8fbbdfad3679334f822ae9398f573ee4c5c452eaaafaeabf5e5fe60096139
-
SSDEEP
49152:rPMtnSm/DWCQEvWZ+mIm/ygWA3s33EMrDIyTrQ:rPMFf3vVuhWA3skwDIyfQ
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b9a4a9c986d2bae1198c2fa3d8c344ae271dd2e1c72ac84787722a05d33d384
Files
-
1b9a4a9c986d2bae1198c2fa3d8c344ae271dd2e1c72ac84787722a05d33d384.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.jxmnr Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lpkez Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.g Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE