Static task
static1
Behavioral task
behavioral1
Sample
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe
Resource
win10v2004-20240508-en
General
-
Target
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918
-
Size
506KB
-
MD5
110c9d0751fc34165b2ac572d1da64b1
-
SHA1
b8f495f76da0467fc0a57c8312b4e2b1ce0fc38a
-
SHA256
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918
-
SHA512
32219b18bb42bb2b8f7cead20e7598b28dfd2de2b2f561bcd1d7c4f0db96d9b0554b97044400d0c66c222838deb26190e6f0d2da256517828d3d714154861f99
-
SSDEEP
12288:wlbU+M1gL5pRTcAkS/3hzN8qE43fm78V8:WbU+p5jcAkSYqyE8
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918
Files
-
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
VHqxTUpa Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IaDsgWGk Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE