Behavioral task
behavioral1
Sample
f0dc81829b3bba76b4884c79db43bf73b302998eb0aeb8fa2c9a63aae52b015e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f0dc81829b3bba76b4884c79db43bf73b302998eb0aeb8fa2c9a63aae52b015e.exe
Resource
win10v2004-20240226-en
General
-
Target
VirusShare_ea84ae7da489456d6de2358e03ede023.zip
-
Size
54KB
-
MD5
46552868e0d21c9f62a017246957467d
-
SHA1
0a5d2aff8493b12950b628b318324fe06ff3661e
-
SHA256
f261b773f73f8f90bdc39c555e66b917aa368ef4d46c151100ec7654de1d21b3
-
SHA512
96668f9dd69c36332181973cdc71ac708d96420ba66ee4df510f7442b0e6327395feb672289a03e4e9c9f98f1d39b2ad5943b1f183a34ab6fef96cefdd155854
-
SSDEEP
768:fnY/H5/Jz0Se4LRPgPeDX6WuZr8F8z2RONo7wysNm2dX5+XixJKUlBpmHR6uUoAW:fIXz0STtYGO9ZcqhQWmYMXiSUpFuStdy
Malware Config
Signatures
-
resource yara_rule static1/unpack001/f0dc81829b3bba76b4884c79db43bf73b302998eb0aeb8fa2c9a63aae52b015e upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f0dc81829b3bba76b4884c79db43bf73b302998eb0aeb8fa2c9a63aae52b015e
Files
-
VirusShare_ea84ae7da489456d6de2358e03ede023.zip.zip
Password: infected
-
f0dc81829b3bba76b4884c79db43bf73b302998eb0aeb8fa2c9a63aae52b015e.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 64KB - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE