Static task
static1
Behavioral task
behavioral1
Sample
e0a5e700ddfaee3a1812da077a41ff307abde73f8dff09f076d9b285ae404a63.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0a5e700ddfaee3a1812da077a41ff307abde73f8dff09f076d9b285ae404a63.exe
Resource
win10v2004-20240412-en
General
-
Target
e0a5e700ddfaee3a1812da077a41ff307abde73f8dff09f076d9b285ae404a63
-
Size
4KB
-
MD5
8906b749644d30d647cdd4393d27c0ef
-
SHA1
43641a615feda16228a70f6dcde6a43ad531a9e6
-
SHA256
e0a5e700ddfaee3a1812da077a41ff307abde73f8dff09f076d9b285ae404a63
-
SHA512
cd05d0e30bf91f0a4a1d644cf8181d61aeb5f10976612ed6af6ecc63eb1f34a0720624e21bcf1291159cdf17150f91289e02f205ef013f0975122170e9edab53
-
SSDEEP
96:LiIdSLQPZARC3dCE8Y0Jw5NL6EVwHHKg2:mswdRCNCE8YPWowHHK7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0a5e700ddfaee3a1812da077a41ff307abde73f8dff09f076d9b285ae404a63
Files
-
e0a5e700ddfaee3a1812da077a41ff307abde73f8dff09f076d9b285ae404a63.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
19k6kjbf Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
l008ubei Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
h062zwxn Size: 576B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE