Behavioral task
behavioral1
Sample
fbf88096f27fdc1c7f688cd22d380442f0c93b5280ce3badbed311ebd8e1f358.exe
Resource
win7-20240704-en
General
-
Target
fbf88096f27fdc1c7f688cd22d380442f0c93b5280ce3badbed311ebd8e1f358
-
Size
112KB
-
MD5
6e52e9a30eaf5054f4e2e39a9930b547
-
SHA1
c57168d421097e670beb6346eba33fb8330f587d
-
SHA256
fbf88096f27fdc1c7f688cd22d380442f0c93b5280ce3badbed311ebd8e1f358
-
SHA512
147bb2a273203dabab13a7c4be0aefe19daeab834014ed5d9703713cbb277d5a21a405563b237aab98ddabc95606ceb9bbdd24d1a41a12b3fe3ff7ec22a00250
-
SSDEEP
1536:CTW7JJZENTNyl2Sm0mGnZSjaYavUgJt8ynjorj9SvzpNzCbq9a1Dd:htE424nfPvUgHz7zi
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource fbf88096f27fdc1c7f688cd22d380442f0c93b5280ce3badbed311ebd8e1f358 unpack001/out.upx
Files
-
fbf88096f27fdc1c7f688cd22d380442f0c93b5280ce3badbed311ebd8e1f358.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ