Static task
static1
Behavioral task
behavioral1
Sample
32fd8f1b254a932406146818a133b39e43d9b8baa70800354ffc4544ac42ff97.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32fd8f1b254a932406146818a133b39e43d9b8baa70800354ffc4544ac42ff97.exe
Resource
win10v2004-20240508-en
General
-
Target
32fd8f1b254a932406146818a133b39e43d9b8baa70800354ffc4544ac42ff97
-
Size
95KB
-
MD5
fd2c98030807b419ca1e9f490616a33c
-
SHA1
64a55c78c050e86f00520b08e58c73b7650a2953
-
SHA256
32fd8f1b254a932406146818a133b39e43d9b8baa70800354ffc4544ac42ff97
-
SHA512
78e3e013ccce17fa828d3d99b37a6139bbbdb8e8f736eeba44533a0c9bd483c5e8328ceed295e509c99060472ef826482c75774531df2b9a2b49ba1c7e214798
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FfgG+sdguxnSngBNpT/mzNnxPAxEAz0+/8omQ:HQC/yj5JO3MnfgG+Hu54Fx4xE8EomCPP
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 32fd8f1b254a932406146818a133b39e43d9b8baa70800354ffc4544ac42ff97
Files
-
32fd8f1b254a932406146818a133b39e43d9b8baa70800354ffc4544ac42ff97.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
VHqxTUpa Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IaDsgWGk Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE