Behavioral task
behavioral1
Sample
d754c04f6cd5537cd726851ebda67226fe783aea7a874a56f8257ec82e479ab5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d754c04f6cd5537cd726851ebda67226fe783aea7a874a56f8257ec82e479ab5.exe
Resource
win10v2004-20240419-en
General
-
Target
d754c04f6cd5537cd726851ebda67226fe783aea7a874a56f8257ec82e479ab5
-
Size
1.4MB
-
MD5
d04ba57989b35d64c24b9831e4efdfb8
-
SHA1
3ba409f1b9eb93421ebc32037a41f294800ef8cf
-
SHA256
d754c04f6cd5537cd726851ebda67226fe783aea7a874a56f8257ec82e479ab5
-
SHA512
ccdc00332de1e54fa9954570c115996a6f2a6f847f6809770c004b726e61500fac552d8ce37e36fa3c6aa3af4ce6b2ffebc96f5908d1d0ad4674cdeabcde723b
-
SSDEEP
24576:xn/zqunbrGUcVUeiSiZi/6GbJqu259KAQbhwJ42bc3aw3tuMfeYau94gZLJKB:FLqciHbii/y/59KAOsbcKgt3GAU
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d754c04f6cd5537cd726851ebda67226fe783aea7a874a56f8257ec82e479ab5
Files
-
d754c04f6cd5537cd726851ebda67226fe783aea7a874a56f8257ec82e479ab5.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qhx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sy Size: 512B - Virtual size: 4KB