Behavioral task
behavioral1
Sample
39e539bb4497cd5b029192369510338327f6b4741f9318ce67a6842c19ad49ff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39e539bb4497cd5b029192369510338327f6b4741f9318ce67a6842c19ad49ff.exe
Resource
win10v2004-20240611-en
General
-
Target
39e539bb4497cd5b029192369510338327f6b4741f9318ce67a6842c19ad49ff.exe
-
Size
191KB
-
MD5
3530632d4a91235c194d1bda030e7470
-
SHA1
ab22fda7f7b4017759fbc132f7ace701e38d3e72
-
SHA256
39e539bb4497cd5b029192369510338327f6b4741f9318ce67a6842c19ad49ff
-
SHA512
be20091791cc9790794f15a932f24ea9353346b186084cbfcf6042eaa9efc76b6fb1fafe6d5ff6685223942ba3cbd62fdad608d816853bbbafac41b72125f270
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOVYd7n97ndJA/fqJA/fL7Zf/FAX:fnyiQSohsUsKY5Z+nyiQSohsUsKY5ZQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39e539bb4497cd5b029192369510338327f6b4741f9318ce67a6842c19ad49ff.exe
Files
-
39e539bb4497cd5b029192369510338327f6b4741f9318ce67a6842c19ad49ff.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE