Behavioral task
behavioral1
Sample
2a4f0a458d1e94406d5efce7834f2cc76796919b0f26a6690363d60143808c3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a4f0a458d1e94406d5efce7834f2cc76796919b0f26a6690363d60143808c3f.exe
Resource
win10v2004-20240412-en
General
-
Target
2a4f0a458d1e94406d5efce7834f2cc76796919b0f26a6690363d60143808c3f
-
Size
87KB
-
MD5
ca9337634406010c2b04e97e8417fa91
-
SHA1
f5c05ed28c55e929f57e08d109d5345efb27115d
-
SHA256
2a4f0a458d1e94406d5efce7834f2cc76796919b0f26a6690363d60143808c3f
-
SHA512
ee0512de6d88fe8388c00234a19cf87881b02e068996b02e2acdf1a4b7c32ee0052b4e1a5bd15d085ba957115956ae7f702da7a2254b38cd8adde72655a96b80
-
SSDEEP
1536:N5VzcfA/6LrVpL74gfh16nOWT//c2henTMIHECtoKod6A3oBj9qfOPFFBZjATGx:/V2A/gVh74gpgHk46THECtkS5Hk6x
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2a4f0a458d1e94406d5efce7834f2cc76796919b0f26a6690363d60143808c3f unpack001/out.upx
Files
-
2a4f0a458d1e94406d5efce7834f2cc76796919b0f26a6690363d60143808c3f.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.htext Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE