Behavioral task
behavioral1
Sample
3f2b80f36e31f2c04fcf1dd64638f68f13c2d6b5415e5bb047e31c0b7b1016d6.exe
Resource
win7-20240221-en
General
-
Target
3f2b80f36e31f2c04fcf1dd64638f68f13c2d6b5415e5bb047e31c0b7b1016d6
-
Size
479KB
-
MD5
69f886083fa70a5d8980285299e975a1
-
SHA1
13343b19c092939b4e89287680181b22172af91a
-
SHA256
3f2b80f36e31f2c04fcf1dd64638f68f13c2d6b5415e5bb047e31c0b7b1016d6
-
SHA512
a5d2db7c0496bb1ff4ab26d9e85fd52a3d780daaa7133831347ef631ba51dd67085c8f492a7b01ece08ff602e6f74813ec48dc5f0ca29f42b87c2bd51caa9bb7
-
SSDEEP
6144:l63+NDdL0yqu5uPBhLRjpML0KYj3NAilJ0FcmjUH:I+HAJ3PBh9jkK3NAi/0FceE
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f2b80f36e31f2c04fcf1dd64638f68f13c2d6b5415e5bb047e31c0b7b1016d6
Files
-
3f2b80f36e31f2c04fcf1dd64638f68f13c2d6b5415e5bb047e31c0b7b1016d6.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
camzt Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxda Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE