Behavioral task
behavioral1
Sample
a1a060647b2ffe112fd407ddbedf83c6009e403cce88138c5c55986fc4f95da5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a1a060647b2ffe112fd407ddbedf83c6009e403cce88138c5c55986fc4f95da5.exe
Resource
win10v2004-20240419-en
General
-
Target
a1a060647b2ffe112fd407ddbedf83c6009e403cce88138c5c55986fc4f95da5
-
Size
597KB
-
MD5
064edc3d184835fac17c4f6ef6675c06
-
SHA1
663d5641a32d907a00d500f03fdb97d9675095a4
-
SHA256
a1a060647b2ffe112fd407ddbedf83c6009e403cce88138c5c55986fc4f95da5
-
SHA512
3feb9ccecd8f307d7b098626dcb6735ccd74be93eedd454900a7c77454236374872eacdc95d467d43feb8a511f91cd52decf11356c97fbcbbb5dec057d6c4994
-
SSDEEP
12288:VEQoSfq/WZ5EeVpCK5lheFQD/qx2yNL4MdNNV2aV3r:V/PCe6QD/FydNNwaV3r
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1a060647b2ffe112fd407ddbedf83c6009e403cce88138c5c55986fc4f95da5
Files
-
a1a060647b2ffe112fd407ddbedf83c6009e403cce88138c5c55986fc4f95da5.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE