Behavioral task
behavioral1
Sample
a43cd3267512c7e4cbc01f2ba26775af0e1e465fb0f729a3e0594452bebf52b4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a43cd3267512c7e4cbc01f2ba26775af0e1e465fb0f729a3e0594452bebf52b4.exe
Resource
win10v2004-20240226-en
General
-
Target
a43cd3267512c7e4cbc01f2ba26775af0e1e465fb0f729a3e0594452bebf52b4
-
Size
108KB
-
MD5
01205d17474e189c57d30ea33303b43c
-
SHA1
992c81fbbc89bc2bb53c81ed36ee07e55dd9418d
-
SHA256
a43cd3267512c7e4cbc01f2ba26775af0e1e465fb0f729a3e0594452bebf52b4
-
SHA512
29ec150032a300229c152857f1cff52478e64c6ec509a7e528f030390a8d448de757b5cb502bc7053c57a8fd17d87b4b7d3b622cd08035a4c572ec34c79823ff
-
SSDEEP
1536:NzUIb25A8ULw005o09WDuYHGjUAsOwRD2h++:dUIbS5xquYmSOwRS
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a43cd3267512c7e4cbc01f2ba26775af0e1e465fb0f729a3e0594452bebf52b4
Files
-
a43cd3267512c7e4cbc01f2ba26775af0e1e465fb0f729a3e0594452bebf52b4.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE