Behavioral task
behavioral1
Sample
aad42be638024c5188d0c6333f4dffc9cb8d8bc6edb1a7f60bb190fc70fc9efa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aad42be638024c5188d0c6333f4dffc9cb8d8bc6edb1a7f60bb190fc70fc9efa.exe
Resource
win10v2004-20240611-en
General
-
Target
aad42be638024c5188d0c6333f4dffc9cb8d8bc6edb1a7f60bb190fc70fc9efa.exe
-
Size
54KB
-
MD5
0d5426056f51c7c24f0dec7919929003
-
SHA1
f2d548448c4d53a5f53f7fdf70716a1d26a35570
-
SHA256
aad42be638024c5188d0c6333f4dffc9cb8d8bc6edb1a7f60bb190fc70fc9efa
-
SHA512
e9ed1903b46be603c633fc5b7cf0caabc6b95c5e1363a48552b856642759ca6e188093fb51ead3bc76782e2135ac7167d90177fab0ffe4d082e7d85e437be21b
-
SSDEEP
768:DEu13lmPcOZiBuuFaySLuJR9jKvwj827FlKFti86aSMWaFe3cNAceSU4rLfycg7e:D91mPcOZUwLuJjjKYNFlAWaK2JUv71c
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aad42be638024c5188d0c6333f4dffc9cb8d8bc6edb1a7f60bb190fc70fc9efa.exe
Files
-
aad42be638024c5188d0c6333f4dffc9cb8d8bc6edb1a7f60bb190fc70fc9efa.exe.exe windows:4 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE