Behavioral task
behavioral1
Sample
a5365d3f58ec07cec443b884b3cf6773763f3b3d88535126363d0ccb3e89fd43.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5365d3f58ec07cec443b884b3cf6773763f3b3d88535126363d0ccb3e89fd43.exe
Resource
win10v2004-20240419-en
General
-
Target
a5365d3f58ec07cec443b884b3cf6773763f3b3d88535126363d0ccb3e89fd43
-
Size
188KB
-
MD5
dcf73e954514b5280a6b72361906bb47
-
SHA1
b561933b42d22eff85d245771a6ae9c3b3c1bfd0
-
SHA256
a5365d3f58ec07cec443b884b3cf6773763f3b3d88535126363d0ccb3e89fd43
-
SHA512
e73e5e3cc2fa8a5d210f7cc4aae1fd7271a178fe55ac29e76c009d8581bdc080ef83ad2b8825cb10b8447cb394154a8a431cf6299d8452b050d796234e5d4761
-
SSDEEP
3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIuj:JiQSo1EZGtKgZGtK/CAIuZAIuj
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5365d3f58ec07cec443b884b3cf6773763f3b3d88535126363d0ccb3e89fd43
Files
-
a5365d3f58ec07cec443b884b3cf6773763f3b3d88535126363d0ccb3e89fd43.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE