Behavioral task
behavioral1
Sample
fe04354cbb11c582c9623612f38abf5fba83b0427c5cd63860ffa246d113f3a9.exe
Resource
win7-20240221-en
General
-
Target
fe04354cbb11c582c9623612f38abf5fba83b0427c5cd63860ffa246d113f3a9
-
Size
479KB
-
MD5
1ea7608aeb057c4ef32a02067eb12011
-
SHA1
3877594a53e4049b90d66f46b251157972307cc0
-
SHA256
fe04354cbb11c582c9623612f38abf5fba83b0427c5cd63860ffa246d113f3a9
-
SHA512
42f1da3d521958fa6a7c2bbda1a2b23d8021f7fb253e8fe87490e7df35c5924c8f2d614dd1eede34d33ce094939b75a83fb0e6c5994ddf5978eca7dd3bb2752f
-
SSDEEP
6144:l63+NDdL0yqu5uPBhLRjpML0KYj3NAilJ0FcmjUp:I+HAJ3PBh9jkK3NAi/0Fceq
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe04354cbb11c582c9623612f38abf5fba83b0427c5cd63860ffa246d113f3a9
Files
-
fe04354cbb11c582c9623612f38abf5fba83b0427c5cd63860ffa246d113f3a9.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
camzt Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxda Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE