Static task
static1
Behavioral task
behavioral1
Sample
07ddd67c9c10844a1f23f93f22c82b12af13d2d15b06e8213aa6da1dcf224603.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07ddd67c9c10844a1f23f93f22c82b12af13d2d15b06e8213aa6da1dcf224603.exe
Resource
win10v2004-20240226-en
General
-
Target
07ddd67c9c10844a1f23f93f22c82b12af13d2d15b06e8213aa6da1dcf224603
-
Size
10KB
-
MD5
4bcc081a19284c4acda4d19816ebe12a
-
SHA1
aed9771a198264c9dacd9fa1c0752369994b7023
-
SHA256
07ddd67c9c10844a1f23f93f22c82b12af13d2d15b06e8213aa6da1dcf224603
-
SHA512
ac04af8c99397b84692c4be67ddf68480eeebc17dacbdb1464ab4be5c097ec2f7bb93b6ef70e26f3ae84dbca373e136e577dfdd3ab4f75622da385717131df39
-
SSDEEP
192:RobJahFbNk7LqyI5usqA9KcGlDp+jj1ljGVQvOFXsayE:Roda5VNum9VGj+jjvehyE
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 07ddd67c9c10844a1f23f93f22c82b12af13d2d15b06e8213aa6da1dcf224603
Files
-
07ddd67c9c10844a1f23f93f22c82b12af13d2d15b06e8213aa6da1dcf224603.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
RjcHalKw Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
qmpJQplM Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE