Behavioral task
behavioral1
Sample
c1c499dcd9e88d5492e1430fbb70d00b133b45d68e6b86064004bd943c613797.exe
Resource
win7-20240611-en
General
-
Target
c1c499dcd9e88d5492e1430fbb70d00b133b45d68e6b86064004bd943c613797
-
Size
443KB
-
MD5
de8f5d311f4e0b1e0c9881ebfb85cc7c
-
SHA1
e9f94fe5ff9337f23782c3cf17eb49d27928af83
-
SHA256
c1c499dcd9e88d5492e1430fbb70d00b133b45d68e6b86064004bd943c613797
-
SHA512
4874fd8e61be34e71b1716b84d759328dd2d2aaa1521880e7ac02585d676d61c3fec14ebdadc8e272bce70c8ce75ba402c9c54bcd9b72a22cecdb5a203c61586
-
SSDEEP
12288:M4wFHoSpg4wFHonR/nPF2LnFL4wF04wFK4wFK4wlun:UrR/nPg
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1c499dcd9e88d5492e1430fbb70d00b133b45d68e6b86064004bd943c613797
Files
-
c1c499dcd9e88d5492e1430fbb70d00b133b45d68e6b86064004bd943c613797.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tkjdelw Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xACidIma Size: 5KB - Virtual size: 4KB
WZGvBGeW Size: 18KB - Virtual size: 18KB
ZQTCapqz Size: 41KB - Virtual size: 40KB
JQblyDyT Size: 6KB - Virtual size: 5KB
GIYlHWoB Size: 1KB - Virtual size: 1KB
YTJaEXpY Size: 512B - Virtual size: 489B
rdtNpjVC Size: 124KB - Virtual size: 123KB
hgvYuiJd Size: 5KB - Virtual size: 4KB
pPCQRmzf Size: 150KB - Virtual size: 149KB
QyqhpZZC Size: 30KB - Virtual size: 30KB