Behavioral task
behavioral1
Sample
eb976c9c8846c013e9b47fd704d67efcec681e2f89ada70f5936df9115cc63eb.exe
Resource
win7-20240729-en
General
-
Target
7178e153ea78465a04e9b4614dc19524.zip
-
Size
13KB
-
MD5
cfa54e727251ef84136ea1ecba64e272
-
SHA1
df65db0a8d322ae95154cef408dc690d5e5eb953
-
SHA256
278f2a3a6fa08d5097c4ada1287d4a5a8dc397007c442b4bdafc752e16388dcc
-
SHA512
dab6f134f27d4b18926d619664a05cdfd650886ef191e218c2a38a3a1ba55c846e845669b02a29dc25e556d116c8a03a12a46ae298606bbeb58d0739a86c8e68
-
SSDEEP
384:/1M9aVyoETVq4SHSauVSoCTMqSUyEb19y11B:6oVx0qXHSWN4EZ9o
Malware Config
Signatures
-
resource yara_rule static1/unpack001/eb976c9c8846c013e9b47fd704d67efcec681e2f89ada70f5936df9115cc63eb upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/eb976c9c8846c013e9b47fd704d67efcec681e2f89ada70f5936df9115cc63eb unpack002/out.upx
Files
-
7178e153ea78465a04e9b4614dc19524.zip.zip
Password: infected
-
eb976c9c8846c013e9b47fd704d67efcec681e2f89ada70f5936df9115cc63eb.exe windows:4 windows x86 arch:x86
Password: infected
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE