Behavioral task
behavioral1
Sample
b004bed240e2682b7d15bf1aad027200c4f6827c4091afb847c6ad8211466562.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b004bed240e2682b7d15bf1aad027200c4f6827c4091afb847c6ad8211466562.exe
Resource
win10v2004-20240611-en
General
-
Target
b004bed240e2682b7d15bf1aad027200c4f6827c4091afb847c6ad8211466562
-
Size
53KB
-
MD5
2d2f14bde2742f9d6ccdd2bc7f2054f4
-
SHA1
b8fdd3e289e626f57a9cecac87b5ba4128e52c30
-
SHA256
b004bed240e2682b7d15bf1aad027200c4f6827c4091afb847c6ad8211466562
-
SHA512
abf953f35599c4670d98e797f8c8f8df673e6915384234689c8e593dd535bcb05001923947fc3353fc017dfc93c957d5d497a3da5e4736757f02a17f740ec0fc
-
SSDEEP
768:svxa3HNCmd98GrARNx4PsED3VK2+ZtyOjgO4r9vFAg2rqW:/3MbeYTjipvF2r
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b004bed240e2682b7d15bf1aad027200c4f6827c4091afb847c6ad8211466562
Files
-
b004bed240e2682b7d15bf1aad027200c4f6827c4091afb847c6ad8211466562.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE