Static task
static1
Behavioral task
behavioral1
Sample
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe
Resource
win10v2004-20240226-en
General
-
Target
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230
-
Size
2.2MB
-
MD5
9fc6cda3cbf7724829b3091d1b1f4d92
-
SHA1
c29041f50413c3ea94d8ed326558fc5caceb61cf
-
SHA256
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230
-
SHA512
264462a23d44315f4cce6229afe3c5e3626feae58b6cbbaf331b65476efe31a8deb839686f3e5e4dc89f0f3baca519c481fda609e1ff0d809a9d8297b5da353d
-
SSDEEP
49152:Wbd+JCbRquA/m2yL5zbfFiV+XenmE3/zX:Wbd+Goq2VjnmU
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230
Files
-
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
VHqxTUpa Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IaDsgWGk Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE