Behavioral task
behavioral1
Sample
trojan_fork.exe
Resource
win7-20240704-en
General
-
Target
trojan_fork.exe
-
Size
22KB
-
MD5
000dc1ba5d7b8830709c768c6c989755
-
SHA1
aaadc5944d1a5b9e267df33149417ba487ee12e0
-
SHA256
badec31f5053a7f27768b763571792b7abac9520a55af25df9682874d78701bc
-
SHA512
84a62bfe8589fba7af7bec381e828d1ab8c271703e096039baa4007f88cf215bfb393ada42c31ff616cec5fe398a2fce7e1ab1367e7ee0a12551fd6773d7b611
-
SSDEEP
384:ymbi1dSUikRgAkCh+HFF0uR0zbaYRZSDO2TSHGYGIOhY/tSaNJawcudoD7UzxgZ:ymcSjkPj+Pb2bTIO2TRYYh6nbcuyD7Uq
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource trojan_fork.exe
Files
-
trojan_fork.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE