Behavioral task
behavioral1
Sample
37d67a422a2c3eac276ec75c6b4600aba1028e244b01a3c9b1e22fbace9dfcad.exe
Resource
win7-20240220-en
General
-
Target
bd50ba38259a5c7a2a376ea20c16d895.bin
-
Size
529KB
-
MD5
abe78c4dc106f514ebdaea3489ceba92
-
SHA1
c9cc99cbb5ce64d9257f7d8b3eea6358df47e692
-
SHA256
cd10f932c30c83a2905d6fb64cb188c400b6dac41f9823e4d8e4de03f3c65d19
-
SHA512
ee7d9a0777dac1d9e3374990877845133f86775cdddc96f3a4cccd9746973cad7db0c3b7c6dad5d1bbce0e1766b8d99ce7b3e934d890a0d0d61a8cd9518ab752
-
SSDEEP
12288:eBQH3QQW/1nP1OZtia1uS+WttD4lExbi5WLxDbJhej8INMLQ7S2UWs:lA//1nP4DgEttn25WLhbej8Ivmh
Malware Config
Signatures
-
resource yara_rule static1/unpack001/37d67a422a2c3eac276ec75c6b4600aba1028e244b01a3c9b1e22fbace9dfcad.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/37d67a422a2c3eac276ec75c6b4600aba1028e244b01a3c9b1e22fbace9dfcad.exe unpack002/out.upx
Files
-
bd50ba38259a5c7a2a376ea20c16d895.bin.zip
Password: infected
-
37d67a422a2c3eac276ec75c6b4600aba1028e244b01a3c9b1e22fbace9dfcad.exe.exe windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 760KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 529KB - Virtual size: 532KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.data Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ