Behavioral task
behavioral1
Sample
8b761997c93b71e903bcebec9a894fe4b17132717a640480935a66f0a22c2778.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b761997c93b71e903bcebec9a894fe4b17132717a640480935a66f0a22c2778.exe
Resource
win10v2004-20240426-en
General
-
Target
8b761997c93b71e903bcebec9a894fe4b17132717a640480935a66f0a22c2778
-
Size
36KB
-
MD5
ec6c5c4c3960fcccf1ab8aeafbb9e613
-
SHA1
52ff3e31edcf970a9e7e339af7d7f4b9828682fa
-
SHA256
8b761997c93b71e903bcebec9a894fe4b17132717a640480935a66f0a22c2778
-
SHA512
056340c2cd3365a8adf3a3650ca56f4c4016fb05f5d868759880a67e7f2df1a5ea8a24efe3c0de343a5b648ab143fcd3cf0f3a0a7f9ff550e3026213b0c68bd8
-
SSDEEP
768:EF66h5nWLQF/NwwCyS50BQifgvYnbcuyD7U:EF6q5WLiVwtipfgvYnouy8
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8b761997c93b71e903bcebec9a894fe4b17132717a640480935a66f0a22c2778
Files
-
8b761997c93b71e903bcebec9a894fe4b17132717a640480935a66f0a22c2778.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.btnj Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE