Static task
static1
Behavioral task
behavioral1
Sample
12ddc45a8cecf1e5a4d454a90a86c1b28ab6dee0cb98a74549058b508a715081.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
12ddc45a8cecf1e5a4d454a90a86c1b28ab6dee0cb98a74549058b508a715081.exe
Resource
win10v2004-20240508-en
General
-
Target
12ddc45a8cecf1e5a4d454a90a86c1b28ab6dee0cb98a74549058b508a715081
-
Size
4KB
-
MD5
94c3a167daed020f5d5f922100ae2d76
-
SHA1
0b049fc9782834cca4ef405670ec4adf4fab1113
-
SHA256
12ddc45a8cecf1e5a4d454a90a86c1b28ab6dee0cb98a74549058b508a715081
-
SHA512
6cc263bf3bbb1987d90c47c3fd78f1947457de9d772b46eeeb211111e3e4a1e3c61aaf94706261871a521b9d03288dd75c616a1d57557bdca106611504023c0e
-
SSDEEP
96:LtrIdSLQPZARC3dCE8Y0Jw5NL6EVwHHKg2:JrswdRCNCE8YPWowHHK7
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12ddc45a8cecf1e5a4d454a90a86c1b28ab6dee0cb98a74549058b508a715081
Files
-
12ddc45a8cecf1e5a4d454a90a86c1b28ab6dee0cb98a74549058b508a715081.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
7i4ellcf Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7497fhej Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7k50wzkn Size: 576B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE