Behavioral task
behavioral1
Sample
fd7d3726a784a49394194abb224b6e80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd7d3726a784a49394194abb224b6e80N.exe
Resource
win10v2004-20240802-en
General
-
Target
fd7d3726a784a49394194abb224b6e80N.exe
-
Size
75KB
-
MD5
fd7d3726a784a49394194abb224b6e80
-
SHA1
f08d3d90785dd6d497f5b9418ad2ceb72ece9f8b
-
SHA256
a6485043be4fd98359142dd9797f544dcf4f660fca1e9229e9c90807f9dd145a
-
SHA512
9c2a2c328f6897d4bca4ff791e90d98d477619a515e1ed9537d28b088465e6d9d354748f03e29dd8990b48057cbb069bd41600046fab26d22dbd987664c93bb6
-
SSDEEP
768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tikBT37CPKKdJJ1EXBwzEXBwdz:CTW7JJ7TTQoQCTW7JJ7TTQoQU
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource fd7d3726a784a49394194abb224b6e80N.exe unpack001/out.upx
Files
-
fd7d3726a784a49394194abb224b6e80N.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ