Behavioral task
behavioral1
Sample
d4b7be023366eb9208b993b3bb010500N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d4b7be023366eb9208b993b3bb010500N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4b7be023366eb9208b993b3bb010500N.exe
-
Size
25KB
-
MD5
d4b7be023366eb9208b993b3bb010500
-
SHA1
8a60f460b615f5773c31dabb65aff59433f34c45
-
SHA256
721d5bad95e1b7783a012496ccc47deafba46d532719ad8752b49479caf42ac3
-
SHA512
5ed3d03841e9be334cfa438a2d8c6c5ab310f399bcae26c8142a2ca29b7c1491b3b1d77b251bc7cc4b504d972b1b057c9bc2e5d8394d0692f3ae51a8e478b473
-
SSDEEP
384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxmDEFE9rt:kBT37CPKKdJJ1EXBwzEXBwdcMcxrt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource d4b7be023366eb9208b993b3bb010500N.exe unpack001/out.upx
Files
-
d4b7be023366eb9208b993b3bb010500N.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ