Behavioral task
behavioral1
Sample
4dd1a88b46df661d3fc5c0cc357eef54b96f827514e8f39268b8a7f8c836936a.exe
Resource
win7-20240419-en
General
-
Target
4dd1a88b46df661d3fc5c0cc357eef54b96f827514e8f39268b8a7f8c836936a
-
Size
239KB
-
MD5
4a6fc78fb73f43f17590da00481c2f2a
-
SHA1
dfe5d93248bcfcc365c522c540785a293f2fbdc1
-
SHA256
4dd1a88b46df661d3fc5c0cc357eef54b96f827514e8f39268b8a7f8c836936a
-
SHA512
03005d73de7a080c4d80d5a9bc8d03bfb0cd86d282f1acc56b512346b9ee57eafe467eb3f4c526a724e8f4021d4a648fea3b6917c990ef108b4fc135950b1713
-
SSDEEP
6144:TvNNycZpNBB38b3Eprf59zlyclDpNBB38b3Epr6Gyx3M9rcLzh31r:Tvf1lIfJmrcLzh9
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dd1a88b46df661d3fc5c0cc357eef54b96f827514e8f39268b8a7f8c836936a
Files
-
4dd1a88b46df661d3fc5c0cc357eef54b96f827514e8f39268b8a7f8c836936a.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VdVmqPBC Size: 1KB - Virtual size: 1KB
QlKVIwYA Size: 13KB - Virtual size: 13KB
KQbTBDes Size: 8KB - Virtual size: 7KB
poEJESqf Size: 5KB - Virtual size: 5KB
XiUjdnbX Size: 1KB - Virtual size: 1KB
UmSJUPAt Size: 1024B - Virtual size: 515B
NwZdcTjs Size: 30KB - Virtual size: 29KB
nuMAQAkG Size: 1024B - Virtual size: 924B
HHzEqvgC Size: 50KB - Virtual size: 49KB
zBPaarsw Size: 23KB - Virtual size: 23KB