Behavioral task
behavioral1
Sample
d86e5d1650751392a5c7483b2e140b418f82d82293c238eb2089bae3c5c42871.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d86e5d1650751392a5c7483b2e140b418f82d82293c238eb2089bae3c5c42871.exe
Resource
win10v2004-20240419-en
General
-
Target
d86e5d1650751392a5c7483b2e140b418f82d82293c238eb2089bae3c5c42871
-
Size
332KB
-
MD5
f2562bde675164e6db7f6626fbc969b9
-
SHA1
c55b976da300c42271b18f13cce11fbee10063d2
-
SHA256
d86e5d1650751392a5c7483b2e140b418f82d82293c238eb2089bae3c5c42871
-
SHA512
ff06e1518a0702604b7a7362183aace7a38a9e128707c01b068a108652463c545e60b3363a7485f65caf9070b280c08d2d51d6b0cf92f73bec259dd67f7b9028
-
SSDEEP
6144:JmCAIuZAIuDMVtM/KlOW3WM2J9UpK7ShcHUaZu:7AIuZAIuOhlOW3WM2/vUac
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d86e5d1650751392a5c7483b2e140b418f82d82293c238eb2089bae3c5c42871
Files
-
d86e5d1650751392a5c7483b2e140b418f82d82293c238eb2089bae3c5c42871.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE