Behavioral task
behavioral1
Sample
15d4258db7b8cdec21438df60e34209dcef58d28dbdff1f38746b477c74bb91a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
15d4258db7b8cdec21438df60e34209dcef58d28dbdff1f38746b477c74bb91a.exe
Resource
win10v2004-20240508-en
General
-
Target
15d4258db7b8cdec21438df60e34209dcef58d28dbdff1f38746b477c74bb91a.exe
-
Size
79KB
-
MD5
22e26197be6ca81154fdb3feb45c2fd0
-
SHA1
11ac7471b2daf3c15b85694dc3ed2a78ea20e754
-
SHA256
15d4258db7b8cdec21438df60e34209dcef58d28dbdff1f38746b477c74bb91a
-
SHA512
4414d8d32b4c9fc2e31c7af319e44919bf61a6f1a01af5216abf86a9143affa5afc56ca49a20fb0f97fd24a1aec68dcb764817dae23acc6af893e2c897f65bf7
-
SSDEEP
1536:67Zf/FAxTWY1++PJHJXA/OsIZzvAuxFjHtvKXFWje84:+nyicAPFvN
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 15d4258db7b8cdec21438df60e34209dcef58d28dbdff1f38746b477c74bb91a.exe
Files
-
15d4258db7b8cdec21438df60e34209dcef58d28dbdff1f38746b477c74bb91a.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE