Static task
static1
Behavioral task
behavioral1
Sample
a4b58d39052afc3943699e739bed6eab715b75414dd67b04734081c655258499.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4b58d39052afc3943699e739bed6eab715b75414dd67b04734081c655258499.exe
Resource
win10v2004-20240426-en
General
-
Target
a4b58d39052afc3943699e739bed6eab715b75414dd67b04734081c655258499
-
Size
296KB
-
MD5
9e8f770d3ca1ab6f9b568eccc71d9014
-
SHA1
9fb60cfe7bc39e0816e06d8e509978757862cb4f
-
SHA256
a4b58d39052afc3943699e739bed6eab715b75414dd67b04734081c655258499
-
SHA512
2121398d61c1356d05e419abda2b4ffd131c1a46fa4eb2f9bcd8874637989e69e060ae87321e20b1bf5905ec716a1144167a9972a7ac11e9ab19a667a90897fc
-
SSDEEP
3072:uTCDYDg+vr87rnj3WCW2EW51HKKnWAnJxN8wDSRUT0kbAYn2GgYlBYN2fHYTo+0o:IooZIFH5ndd8DRUTBbAMpgY3gTz
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4b58d39052afc3943699e739bed6eab715b75414dd67b04734081c655258499
Files
-
a4b58d39052afc3943699e739bed6eab715b75414dd67b04734081c655258499.exe windows:4 windows x86 arch:x86
7909826cb72884560635663c8951a127
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
advapi32
OpenProcessToken
user32
ExitWindowsEx
version
GetFileVersionInfoSizeA
ws2_32
WSAStartup
Sections
VHqxTUpa Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IaDsgWGk Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE