Behavioral task
behavioral1
Sample
1d428d844550d4b1928c3dcc01110c80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1d428d844550d4b1928c3dcc01110c80N.exe
Resource
win10v2004-20240802-en
General
-
Target
1d428d844550d4b1928c3dcc01110c80N.exe
-
Size
25KB
-
MD5
1d428d844550d4b1928c3dcc01110c80
-
SHA1
24f44316a5e9e0bc2ada024e54786093e6c2121a
-
SHA256
11be0d4d0ebc0a8b4866e76e2f4ba2b4838a7e9d73496e314e5c74ded36a2183
-
SHA512
f6340fe2c99bf96693e4f7973bd49c7b8d6624dca828568964534c6f74e7400708c986d625144c57741000c4666c00ae68390cb16e2a0f91c2ab6c5402615b88
-
SSDEEP
384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9B6s:kBT37CPKKdJJ1EXBwzEXBwdcMcI9B6s
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 1d428d844550d4b1928c3dcc01110c80N.exe unpack001/out.upx
Files
-
1d428d844550d4b1928c3dcc01110c80N.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ