Behavioral task
behavioral1
Sample
a60076021d26cbb71838ece38ae47bf13d390b6e5bc36f6c751ac25614a8530c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a60076021d26cbb71838ece38ae47bf13d390b6e5bc36f6c751ac25614a8530c.exe
Resource
win10v2004-20240419-en
General
-
Target
a60076021d26cbb71838ece38ae47bf13d390b6e5bc36f6c751ac25614a8530c
-
Size
400KB
-
MD5
45f4e6fe8960fed8ccaa71761fbc20fe
-
SHA1
95cc24f17ba27cdb17f0c5734cdb34e65be83221
-
SHA256
a60076021d26cbb71838ece38ae47bf13d390b6e5bc36f6c751ac25614a8530c
-
SHA512
081ad6e70a1c352a41382c5dd981ca370c87629680006f46b9e45c9d5c94fccf3ee005702867c6b704b2e051a5fddcd9c41f8a2f38a43991a8e9c808811c4ab7
-
SSDEEP
12288:tEQoS9qh69k2pgLVPX5wHUbmf4qiHVSout00q8kspn:t26L+LVPX5jN1So+kspn
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a60076021d26cbb71838ece38ae47bf13d390b6e5bc36f6c751ac25614a8530c
Files
-
a60076021d26cbb71838ece38ae47bf13d390b6e5bc36f6c751ac25614a8530c.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.btnj Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE