Behavioral task
behavioral1
Sample
4b1b9c895d0cc2a2ba83dfe9fb5c97ab7cdbed730e002ccc6cfc04263e30a8d5.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b1b9c895d0cc2a2ba83dfe9fb5c97ab7cdbed730e002ccc6cfc04263e30a8d5.exe
Resource
win10v2004-20240709-en
General
-
Target
4b1b9c895d0cc2a2ba83dfe9fb5c97ab7cdbed730e002ccc6cfc04263e30a8d5
-
Size
12KB
-
MD5
c04648eef277dfb5e3a5da3d5ed53ca7
-
SHA1
818c34bfdda8116e6e6dc6369315776685e41051
-
SHA256
4b1b9c895d0cc2a2ba83dfe9fb5c97ab7cdbed730e002ccc6cfc04263e30a8d5
-
SHA512
c9ec8fd331d2cb86c26dd845dc675ab2762f4770a90c54d402d2a0460f46011af55f42cd76678855cc74550db0bdb074d22b5290971a74538cc926237be89c8b
-
SSDEEP
192:91UWFh4fvYGIQnsA6psQXFaNJhLkwcud2DH9VwGfct1hM5EJ:DKE7pXaNJawcudoD7U7S5EJ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b1b9c895d0cc2a2ba83dfe9fb5c97ab7cdbed730e002ccc6cfc04263e30a8d5
Files
-
4b1b9c895d0cc2a2ba83dfe9fb5c97ab7cdbed730e002ccc6cfc04263e30a8d5.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE