Behavioral task
behavioral1
Sample
12b266656252e45e440b4c7c629e6e5856270039db6d68c5502fb077351fb52f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12b266656252e45e440b4c7c629e6e5856270039db6d68c5502fb077351fb52f.exe
Resource
win10v2004-20240226-en
General
-
Target
12b266656252e45e440b4c7c629e6e5856270039db6d68c5502fb077351fb52f
-
Size
1.2MB
-
MD5
547034ef2ba71636e6a88fb26cd4fc54
-
SHA1
4aff9a99de1a77eefef76d4c42ca94632ace7368
-
SHA256
12b266656252e45e440b4c7c629e6e5856270039db6d68c5502fb077351fb52f
-
SHA512
21a646c7087143f149998f639b2cd4af06ee1a4be81aba6d241ab9d87420699a666dffa6981fccd8d8fbb8423aa090b19aa76544415240c9569189c4f959bfb9
-
SSDEEP
24576:VPlH7fDmhU44WjJMMl32yNDoRqaxpKKBAWgEV26xOysATAcgVQ:FlbfDmR18y5cNxMKBDgILxOjfQ
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12b266656252e45e440b4c7c629e6e5856270039db6d68c5502fb077351fb52f
Files
-
12b266656252e45e440b4c7c629e6e5856270039db6d68c5502fb077351fb52f.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE