Behavioral task
behavioral1
Sample
8bcd998d7ccd2ce4b303495f9e6ef5fad7116eaa46b2eb956bfb95c98f5e5b8c.exe
Resource
win7-20240705-en
General
-
Target
8bcd998d7ccd2ce4b303495f9e6ef5fad7116eaa46b2eb956bfb95c98f5e5b8c
-
Size
150KB
-
MD5
342427229352fb98dcf46a9a33e963c0
-
SHA1
72f3274e7cc8bb87c7950ca004e81b3f71c5a646
-
SHA256
8bcd998d7ccd2ce4b303495f9e6ef5fad7116eaa46b2eb956bfb95c98f5e5b8c
-
SHA512
3fc1a9389985c10326922a551047ac1caa3179c901575941a72e533498e6e470a8c01db539572fd97348f11bd499a489b1262a045405cf6c1f00807042ff51a6
-
SSDEEP
3072:htEevpQ4Aa1ZthsMxFUy4ipiIUC5wzPzhx6:fEYQYZthsMxFQJIUGyzr6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 8bcd998d7ccd2ce4b303495f9e6ef5fad7116eaa46b2eb956bfb95c98f5e5b8c unpack001/out.upx
Files
-
8bcd998d7ccd2ce4b303495f9e6ef5fad7116eaa46b2eb956bfb95c98f5e5b8c.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ