Behavioral task
behavioral1
Sample
4e1a054184589a142c1934137702d70d6b533726f901a00ac495d5cfdddbf712.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e1a054184589a142c1934137702d70d6b533726f901a00ac495d5cfdddbf712.exe
Resource
win10v2004-20240426-en
General
-
Target
4e1a054184589a142c1934137702d70d6b533726f901a00ac495d5cfdddbf712
-
Size
208KB
-
MD5
83c0bda8a894e38830cc47b6756de261
-
SHA1
e9486de1edc3149e2373d03fc240e634a04d6912
-
SHA256
4e1a054184589a142c1934137702d70d6b533726f901a00ac495d5cfdddbf712
-
SHA512
b1986c17b59c833ca21d22ddd6db1a9e634f1686a9d01a35dc37e2d1d8243a77aa6c1081b9fd526e19d85be242339078de9fd360a6944862e0cb9bf68e38bd80
-
SSDEEP
3072:+nymCAIuZAIuYSMjoqtMHfhfkPdA9yaMDT2O:JmCAIuZAIuDMVtM/5wT7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e1a054184589a142c1934137702d70d6b533726f901a00ac495d5cfdddbf712
Files
-
4e1a054184589a142c1934137702d70d6b533726f901a00ac495d5cfdddbf712.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE