Behavioral task
behavioral1
Sample
cc27284bb01ddf83b45a5f27e50dae918756b81a0d602232105f61b05fc395fb.exe
Resource
win7-20240708-en
General
-
Target
cc27284bb01ddf83b45a5f27e50dae918756b81a0d602232105f61b05fc395fb
-
Size
58KB
-
MD5
59902c7cf724d76a29358b820613a490
-
SHA1
57bc636de626fb6b6d033182f74beba1cbd7b237
-
SHA256
cc27284bb01ddf83b45a5f27e50dae918756b81a0d602232105f61b05fc395fb
-
SHA512
437c77239a5421f36efa331741e311d46943d67ce56cf0350796e0d1be1581a6e5bc0884198d3f47adb7d29f65728fcd9b5249a4f90b03ff93f4df5b1a1e7b6f
-
SSDEEP
768:kBT37CPKKdJJBZBZaOAOIB3jM2jMO/7OSbo5+Oi6Jfo5+Oi6JvEXBwzEXBwkqA7/:CTW7JJB7LD2I2IbSq+12ff
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource cc27284bb01ddf83b45a5f27e50dae918756b81a0d602232105f61b05fc395fb unpack001/out.upx
Files
-
cc27284bb01ddf83b45a5f27e50dae918756b81a0d602232105f61b05fc395fb.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ