Behavioral task
behavioral1
Sample
ed14a8886c207595360dbc904914f5113a656951d9aafc748d56d0e9b8f70742.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
ed14a8886c207595360dbc904914f5113a656951d9aafc748d56d0e9b8f70742.exe
Resource
win11-20240611-en
General
-
Target
ed14a8886c207595360dbc904914f5113a656951d9aafc748d56d0e9b8f70742
-
Size
47KB
-
MD5
40094e123c89625468665c8c196c2ffd
-
SHA1
4919910c4fa32c1acc844f358feeb00f015b0cc5
-
SHA256
ed14a8886c207595360dbc904914f5113a656951d9aafc748d56d0e9b8f70742
-
SHA512
53a3c207aa3421b3b578dddf2bced96616e1e0e5d201a191d1cc2249ec01a2ef53d0a417e1515dbc2743f9877a184e0ddd6844f0e0a99e8980df922941d145d3
-
SSDEEP
768:IZD8ZuVzhUiEklhxFSAEjvhMeZuS0AE86IyjPTeThyq3:IZDsozzbSueyAXmDTAwq3
Malware Config
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/j4iNEL86xFF7nHqdHeXmzAeBZiOx9qbqO8yBqjf5oaYzgBFOyC6xazB5bwLdZUfab3MNGjdmy12pxE3xxztmLvqXP5k8f59R8dtwPDz7ybR5HCxU4G
Signatures
-
Metasploit family
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource ed14a8886c207595360dbc904914f5113a656951d9aafc748d56d0e9b8f70742 unpack001/out.upx
Files
-
ed14a8886c207595360dbc904914f5113a656951d9aafc748d56d0e9b8f70742.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ