Behavioral task
behavioral1
Sample
0e4f034873b1543e1b93082d8b2f00198fb87ebcf63d2815721d94903719f5d6.exe
Resource
win7-20240215-en
General
-
Target
0e4f034873b1543e1b93082d8b2f00198fb87ebcf63d2815721d94903719f5d6
-
Size
86KB
-
MD5
56eeb4724d3e36a95d6c6223c03bdba4
-
SHA1
d319f685261bf45c2836586d2fefb6e707d73095
-
SHA256
0e4f034873b1543e1b93082d8b2f00198fb87ebcf63d2815721d94903719f5d6
-
SHA512
8b65aef07294aa88bcf0975c50165490e978292c0155a54cbf65aaa00ddeac2c8f9fddc1321749dc8e9f411cf72add0f633ab4e457b341a756dd2401f2b265a3
-
SSDEEP
1536:kvQBeOGtrYS3srx93UBWfwC6Ggnouy8p5yAXNlIQkPvA3qrEvO7C82krfiEqkBy1:khOmTsF93UYfwC6GIoutpYcvrqrE66k2
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e4f034873b1543e1b93082d8b2f00198fb87ebcf63d2815721d94903719f5d6
Files
-
0e4f034873b1543e1b93082d8b2f00198fb87ebcf63d2815721d94903719f5d6.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tkjdelw Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE