Behavioral task
behavioral1
Sample
4483483409ae72c6d3ee5071c843e0b4921c134ec1461de681ba978e5abb2969.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4483483409ae72c6d3ee5071c843e0b4921c134ec1461de681ba978e5abb2969.exe
Resource
win10v2004-20240508-en
General
-
Target
4483483409ae72c6d3ee5071c843e0b4921c134ec1461de681ba978e5abb2969
-
Size
41KB
-
MD5
e973a402572bbfa9a18ad8dd7178ca59
-
SHA1
56f5ab640e2eacc106fbf05e5042bdf71d3c06fc
-
SHA256
4483483409ae72c6d3ee5071c843e0b4921c134ec1461de681ba978e5abb2969
-
SHA512
1ea5f4a66e10b2497ed9dbd003e496f21f5bb8315e33188e2b4469b54dd191d8fc7e8b42e0fd54bdc1aa5419641a35112bac9ed5e022d703ec28fdc83a7a51b1
-
SSDEEP
768:yiYoIfHbL8KatMHv+7dwwaleRp2OuyamBlabCY787fsBB6Ryu:XbyYt7LagG3N13oDW2yu
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4483483409ae72c6d3ee5071c843e0b4921c134ec1461de681ba978e5abb2969
Files
-
4483483409ae72c6d3ee5071c843e0b4921c134ec1461de681ba978e5abb2969.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.extrel Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE