Behavioral task
behavioral1
Sample
d44435a856a375943c4c757bc135938c27a6642451aceb8c170770fb47554e33.exe
Resource
win7-20240221-en
General
-
Target
d44435a856a375943c4c757bc135938c27a6642451aceb8c170770fb47554e33
-
Size
366KB
-
MD5
f0b9ab8d2b9120278d4fd14b69e30e14
-
SHA1
2aa2ea85966347a766d5927453414e0ea6b6eb82
-
SHA256
d44435a856a375943c4c757bc135938c27a6642451aceb8c170770fb47554e33
-
SHA512
4d955e611d9be01c44859d85f79d0e1ddf4779c644745ae5c0cd800550f11cac636be88e0b496a2b31286357bab14eaf9bae65a4f592ff8b7281b804fc4beb12
-
SSDEEP
6144:9cm4FmowdHoSdSyEAxyx/ZrTTr4qIMgE8O:/4wFHoSQuxy3rTXIM18O
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d44435a856a375943c4c757bc135938c27a6642451aceb8c170770fb47554e33
Files
-
d44435a856a375943c4c757bc135938c27a6642451aceb8c170770fb47554e33.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE