Behavioral task
behavioral1
Sample
bd3a4ff93d4daeca884885c2345625d3a3d73feb4f68477478f25f32d4795b04.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd3a4ff93d4daeca884885c2345625d3a3d73feb4f68477478f25f32d4795b04.exe
Resource
win10v2004-20240419-en
General
-
Target
bd3a4ff93d4daeca884885c2345625d3a3d73feb4f68477478f25f32d4795b04
-
Size
1.8MB
-
MD5
b19d934fcc6323146a8de50cd2467058
-
SHA1
c901a944af9b244e4cf5284d5f9f5e5edb31c783
-
SHA256
bd3a4ff93d4daeca884885c2345625d3a3d73feb4f68477478f25f32d4795b04
-
SHA512
149b08e096f364483e4245ca03d8305531f68c7f0aa77a65402e0c8bb585dc164ab9043629e1246fb8d70b1e62a7f0094355d82fe0184e14c36456c7136a5ce0
-
SSDEEP
49152:53TLy6px7OScwvYMaK33kz7Nm7lgrUZY0XsFa/SQSns5G:pbpxKSZ5wm7yrUZYba/Sjn2G
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd3a4ff93d4daeca884885c2345625d3a3d73feb4f68477478f25f32d4795b04
Files
-
bd3a4ff93d4daeca884885c2345625d3a3d73feb4f68477478f25f32d4795b04.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.g Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kxvu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.psfx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fpugn Size: 512B - Virtual size: 4KB