Behavioral task
behavioral1
Sample
73ceeff0c66f3ba402d967c75857341bdf79022964bd7b482969f92338577263.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73ceeff0c66f3ba402d967c75857341bdf79022964bd7b482969f92338577263.exe
Resource
win10v2004-20240730-en
General
-
Target
d8cb1b949632489e2736d4563d82a0eb.bin
-
Size
1.8MB
-
MD5
1cd48655c02f6dc09da77894dc05b191
-
SHA1
ef2cfef5ecaf818030b3af0aae794e2560bfc92b
-
SHA256
0c9ec205f64b14fe04f14a0728c570c061bd45a037fe7e2288b3b4bfd78dab8b
-
SHA512
c015d3fb7764172d244fa34a23d4d704843e6d12c419ea1b510a1639c007cb635f9e21ad69ef665e040666c70066e0826671bcd70173551efb26f372610a13b7
-
SSDEEP
49152:CkrUoih4hiya5meTCXWfZtVfNW0ueaJQqtB:koih4hemeA+tVLodj
Malware Config
Signatures
-
resource yara_rule static1/unpack001/73ceeff0c66f3ba402d967c75857341bdf79022964bd7b482969f92338577263.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/73ceeff0c66f3ba402d967c75857341bdf79022964bd7b482969f92338577263.exe unpack002/out.upx
Files
-
d8cb1b949632489e2736d4563d82a0eb.bin.zip
Password: infected
-
73ceeff0c66f3ba402d967c75857341bdf79022964bd7b482969f92338577263.exe.exe windows:6 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 3.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 215KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ