Behavioral task
behavioral1
Sample
4a68d44900a4d2dd0bdd3384b82897c44aeb326a296443b3e347032847a4d6b6.exe
Resource
win7-20240220-en
General
-
Target
4a68d44900a4d2dd0bdd3384b82897c44aeb326a296443b3e347032847a4d6b6
-
Size
80KB
-
MD5
3933c4c660d4024672ba40d807eb7b90
-
SHA1
7f86efed4494760323736b2db0a6dd28c2d24329
-
SHA256
4a68d44900a4d2dd0bdd3384b82897c44aeb326a296443b3e347032847a4d6b6
-
SHA512
72448088723f82752ccdc86e4df82b7877819fb65b8e65e91ee1897443c33d075dd948894d82a17fed8f21a7ff365bc0ba6d6f33396eadea519ad0db621783e6
-
SSDEEP
1536:zvQBeOGtrYS3srx93UBWfwC6Ggnouy8iT4+C2HVM1p6TVqMJ897:zhOmTsF93UYfwC6GIoutiTU2HVS6cMJs
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4a68d44900a4d2dd0bdd3384b82897c44aeb326a296443b3e347032847a4d6b6
Files
-
4a68d44900a4d2dd0bdd3384b82897c44aeb326a296443b3e347032847a4d6b6.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE