Behavioral task
behavioral1
Sample
dd268d6535640deb4b9ab3fa4239f00735511d7d00c7e769052616d62117e55f.exe
Resource
win7-20240729-en
General
-
Target
dd268d6535640deb4b9ab3fa4239f00735511d7d00c7e769052616d62117e55f
-
Size
730KB
-
MD5
2e9383bdb00679e853e50b8e9c83558a
-
SHA1
14cbeaf529eed991b6ea98aaadab474836d372d2
-
SHA256
dd268d6535640deb4b9ab3fa4239f00735511d7d00c7e769052616d62117e55f
-
SHA512
2ac1275aafc9eb6ad4ce845c66b0d600c89e261e669cb9a17237d977ae910650d8011f4cf272493069062a3185d74c55871668d93e64da3103a8c0587e12010d
-
SSDEEP
12288:/oQXJ/8tJV+VUxmSMkqA3C0pF9yapDI0/0:gQZ/SVEcmSMkqA3C0pF9ys8F
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource dd268d6535640deb4b9ab3fa4239f00735511d7d00c7e769052616d62117e55f unpack001/out.upx
Files
-
dd268d6535640deb4b9ab3fa4239f00735511d7d00c7e769052616d62117e55f.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ