Behavioral task
behavioral1
Sample
63dda37804a7e693d0c29109a4820266cf1a3d71fe31365124dd37a543c4cea2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63dda37804a7e693d0c29109a4820266cf1a3d71fe31365124dd37a543c4cea2.exe
Resource
win10v2004-20240611-en
General
-
Target
63dda37804a7e693d0c29109a4820266cf1a3d71fe31365124dd37a543c4cea2
-
Size
1.4MB
-
MD5
44f03aa6e9f8e6dd2559693582ed5778
-
SHA1
59d2bccb460b841aa562adabc04b8759cbd0b432
-
SHA256
63dda37804a7e693d0c29109a4820266cf1a3d71fe31365124dd37a543c4cea2
-
SHA512
9057c16d33d1e7c912563dd0c6a4a127ab36e3ac28af39cb650c19d47b41715f3693d4b0a047ac113ae17847f5e29a829041070c643b253fc121881e66959638
-
SSDEEP
24576:lit/4ruZ0S7sMWE+bt0hKFXhzJ0WI3OTGgHAtHGRS4T6gigpgdCdg:M5ZZD7NBsFXhGWIOpHAHG8oYC6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63dda37804a7e693d0c29109a4820266cf1a3d71fe31365124dd37a543c4cea2
Files
-
63dda37804a7e693d0c29109a4820266cf1a3d71fe31365124dd37a543c4cea2.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.9MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 511B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE