General
-
Target
Podchinenie.exe
-
Size
748KB
-
MD5
c543eb07880455bf98fb54743b4bac6f
-
SHA1
99f3899404cda1fda7ad371e5a28cf741ac275a7
-
SHA256
07bfd8051a808cc09ffe557db6ab7f32b734a98cb79f6fa47da469874e818014
-
SHA512
542e14bdcc883c14c0f865343219d661844221d13dc8ab9e53504dd76b195e58ea1f543b17f5e4974fd618c392f587ba774aa2526edd1a6685b600769fedb550
-
SSDEEP
12288:qo/X/jsxl4wRCPt5TpQaiJoA6oIhVDq+bp13ls4i6dBbLM5wgYQxZ3tbZv/59uXF:qo/7sxl4DPKAA6o2Bbf3ls4txBgr1ZZH
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Podchinenie.exe
Files
-
Podchinenie.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 745KB - Virtual size: 748KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE