Static task
static1
Behavioral task
behavioral1
Sample
4c702e54dfc376c6b885b7198d2eab012042c81eda6a8d4d83f8d36c504e0306.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4c702e54dfc376c6b885b7198d2eab012042c81eda6a8d4d83f8d36c504e0306.exe
Resource
win10v2004-20240419-en
General
-
Target
4c702e54dfc376c6b885b7198d2eab012042c81eda6a8d4d83f8d36c504e0306
-
Size
4KB
-
MD5
49c4686069ccdbf8bb1a408e8c81aa69
-
SHA1
23b9970bd63190a4f344b72550cb3ab8107c2705
-
SHA256
4c702e54dfc376c6b885b7198d2eab012042c81eda6a8d4d83f8d36c504e0306
-
SHA512
c0b14e379e681671458577965a0ca1ab21099f209487e214546df19d6e2e87c51918522e2fb14275cd563b6cb8f4bb1e698f148b4d8d34ff5e3f3b8a209e71ce
-
SSDEEP
96:LY5IdSLQPZARC3dCE8Y0Jw5NL6EVwHHKg2:oswdRCNCE8YPWowHHK7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c702e54dfc376c6b885b7198d2eab012042c81eda6a8d4d83f8d36c504e0306
Files
-
4c702e54dfc376c6b885b7198d2eab012042c81eda6a8d4d83f8d36c504e0306.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
l711ubei Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
h764zwxn Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
g047xscl Size: 576B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE