Behavioral task
behavioral1
Sample
9238b3ca8d5f11a623af14e6a747309f03affdc13fe83832271567d1d46a110c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9238b3ca8d5f11a623af14e6a747309f03affdc13fe83832271567d1d46a110c.exe
Resource
win10v2004-20240419-en
General
-
Target
9238b3ca8d5f11a623af14e6a747309f03affdc13fe83832271567d1d46a110c
-
Size
207KB
-
MD5
10a2b0360c2c000aaa3501e27c9785f6
-
SHA1
f9db878feb52fb234f7bbfe9f817ee6e46aba53e
-
SHA256
9238b3ca8d5f11a623af14e6a747309f03affdc13fe83832271567d1d46a110c
-
SHA512
3153a57b055d7b57ab87499e9d3420b317a427caeefa5cd0c511b06ebca64f44ee1a1fa76b8f772ac5926f0599b25b648826a506e5632473086907e95951bd58
-
SSDEEP
6144:A8jluQoSoIo5R02/ak7lId2uRPSKjuKY1gwv8WN:A8EQoSM42/JcPVjNYWCFN
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9238b3ca8d5f11a623af14e6a747309f03affdc13fe83832271567d1d46a110c
Files
-
9238b3ca8d5f11a623af14e6a747309f03affdc13fe83832271567d1d46a110c.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.edlwv Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oh Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE