Static task
static1
Behavioral task
behavioral1
Sample
ccf2e52a353b8062eaab54691ac421331a846d72a4b35ea4f73b0a6135a20f6a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ccf2e52a353b8062eaab54691ac421331a846d72a4b35ea4f73b0a6135a20f6a.exe
Resource
win10v2004-20240426-en
General
-
Target
ccf2e52a353b8062eaab54691ac421331a846d72a4b35ea4f73b0a6135a20f6a
-
Size
505KB
-
MD5
85a70bd12977734b0e3ef7d859f5524e
-
SHA1
4b98814130d759f5b8d0d6fdd47f8379bf0daa37
-
SHA256
ccf2e52a353b8062eaab54691ac421331a846d72a4b35ea4f73b0a6135a20f6a
-
SHA512
cd3b34e621e9fdaeddc5620b9e5b5d513dbc9303a5588cb6340d4d286f4f6aaa1c1a647f3556ff80409b8d443784127a99920327f1b6bb78f735739aae04c0fc
-
SSDEEP
12288:wlb++b1gL5pRTcAkS/3hzN8qE43fm78VT:Wb++G5jcAkSYqyET
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccf2e52a353b8062eaab54691ac421331a846d72a4b35ea4f73b0a6135a20f6a
Files
-
ccf2e52a353b8062eaab54691ac421331a846d72a4b35ea4f73b0a6135a20f6a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
VHqxTUpa Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IaDsgWGk Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE