Behavioral task
behavioral1
Sample
db60cc9e2f835f9c03e85eea42977162a585d1c43d7cf887a3fbaec3163a2f1b.exe
Resource
win7-20240221-en
General
-
Target
db60cc9e2f835f9c03e85eea42977162a585d1c43d7cf887a3fbaec3163a2f1b
-
Size
401KB
-
MD5
88b5f517a61952aaf4e1c8034464d871
-
SHA1
e2f167661467c18bd73bffb8b9bbc6909785b72b
-
SHA256
db60cc9e2f835f9c03e85eea42977162a585d1c43d7cf887a3fbaec3163a2f1b
-
SHA512
ca4bde9353f2f04b2a356a08cca70cea4f03adbb8a7045838a4915e366cd577456e039171a03d319d1d174e2daa63e51c4e33e3cb200ed38db78dc0c77495651
-
SSDEEP
6144:kcm4FmowdHoSph3Ymu8wdHoSM05d34iWRbzami30:y4wFHoS3zuxHoSTd34iWRhik
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db60cc9e2f835f9c03e85eea42977162a585d1c43d7cf887a3fbaec3163a2f1b
Files
-
db60cc9e2f835f9c03e85eea42977162a585d1c43d7cf887a3fbaec3163a2f1b.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tkjdelw Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE