Behavioral task
behavioral1
Sample
9d4e7723edb838cc55f7cbc817daf7071a5b6d1949371696a24334c4347e7e4f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9d4e7723edb838cc55f7cbc817daf7071a5b6d1949371696a24334c4347e7e4f.exe
Resource
win10v2004-20240508-en
General
-
Target
9d4e7723edb838cc55f7cbc817daf7071a5b6d1949371696a24334c4347e7e4f
-
Size
1.5MB
-
MD5
3941998964ff586a160c69fa4867a295
-
SHA1
c5e19ca839b7ab501e21ee6a3758499f87997598
-
SHA256
9d4e7723edb838cc55f7cbc817daf7071a5b6d1949371696a24334c4347e7e4f
-
SHA512
db9b73ea6b714bcef87a95c3253b6c568e7b02b16a862d022659155ecdb34599769082053213cb83240880e3c36a1a6422a1bd463768a2fe0ff2dc671524f4da
-
SSDEEP
49152:y4DZE7mdbWHgVO1LkU4HPikKytV3BuFJyMK9gnzzRx:bDZyAVKz4HPiFCVAFgMXzzRx
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9d4e7723edb838cc55f7cbc817daf7071a5b6d1949371696a24334c4347e7e4f
Files
-
9d4e7723edb838cc55f7cbc817daf7071a5b6d1949371696a24334c4347e7e4f.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 5.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE