Behavioral task
behavioral1
Sample
83f38b3d60aae264ae1721914192c6eb3e7a2c968f844ebc341d5946d67082f7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
83f38b3d60aae264ae1721914192c6eb3e7a2c968f844ebc341d5946d67082f7.exe
Resource
win10v2004-20240802-en
General
-
Target
7efeb8eaa0c64c8f12bfd57b9bcab48a.zip
-
Size
24KB
-
MD5
811624fa7a85cad5b0fca86837791426
-
SHA1
bd8aee53b894720921a79424b26d3121ddbfd65d
-
SHA256
1148d8f7e2f0161dc198832a3253c4027a9fdb97b49e946271e3a36b9c72e131
-
SHA512
e699bcb33eead65de071bb741d1aef23f33c62efea1e416582b00d9c0a8c46e07d6ffaff7c4a4ea9494df5c84e79377f3e771d6d9ca4ef3fbd08ed594e9911ef
-
SSDEEP
768:guQ1rX6wlIg/tTIpgceDCtQASR1ASbW2PHwxoth88wE:g5jJlIg/RIWJDWRSvASbWkHwCL
Malware Config
Signatures
-
resource yara_rule static1/unpack001/83f38b3d60aae264ae1721914192c6eb3e7a2c968f844ebc341d5946d67082f7 upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/83f38b3d60aae264ae1721914192c6eb3e7a2c968f844ebc341d5946d67082f7 unpack002/out.upx
Files
-
7efeb8eaa0c64c8f12bfd57b9bcab48a.zip.zip
Password: infected
-
83f38b3d60aae264ae1721914192c6eb3e7a2c968f844ebc341d5946d67082f7.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ