Behavioral task
behavioral1
Sample
mail.scr
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
mail.scr
Resource
win10v2004-20240426-en
General
-
Target
f5595b866e90e9122edc8da420b0136ae556e228899ea772930ddaf8bcfb5754.zip
-
Size
21KB
-
MD5
80bb1636051300d916c411b49d0b162c
-
SHA1
d870d3d812aaeb86b4770f11b422d40ac4624d2c
-
SHA256
f5595b866e90e9122edc8da420b0136ae556e228899ea772930ddaf8bcfb5754
-
SHA512
a91715dd454d282d2dfec39fac69dbefd220133c9f44f10bf906298b0cabe53c14cb51dbb6112b12fb61fe3b173a493e0c0f071dbb0c870d51fa056f47d68e4a
-
SSDEEP
384:dZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzU4ekG:6CIqdH/k1ZVcT194jp44er
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/mail.scr upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/mail.scr unpack002/out.upx
Files
-
f5595b866e90e9122edc8da420b0136ae556e228899ea772930ddaf8bcfb5754.zip.zip
-
mail.scr.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ