Behavioral task
behavioral1
Sample
a4905bf6ec859d9b9fb94a57c47bb5bde410822daf7c5af5bda1164a23a2c925.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4905bf6ec859d9b9fb94a57c47bb5bde410822daf7c5af5bda1164a23a2c925.exe
Resource
win10v2004-20240802-en
General
-
Target
c59fa83c81af0260aaa929eb47054e56.zip
-
Size
81KB
-
MD5
c041ceaa508e4e097d6d6d9f530a80db
-
SHA1
203d6029c51a8d5417eb6754d9732256f95f6cf0
-
SHA256
3c47ca72b6adffe8f0927677b034ee8532a26fb1ac66cb13489373e881fc365b
-
SHA512
ef89ddae21d5cbc1bfacf1f313f728c7c611c450ad9aee6b3bc5d7e09ca45cb0851e4ec81ba3fc7297d0cc15a9793660d28133f324bce016c2c389fdead29c57
-
SSDEEP
1536:oGw+TtM4e8CYA+jrOaX/bhlR3fhcXwlANkro88v7WIiqKcL:oGw+qp8rA+H7/llBfplAyrpot3KcL
Malware Config
Signatures
-
resource yara_rule static1/unpack001/a4905bf6ec859d9b9fb94a57c47bb5bde410822daf7c5af5bda1164a23a2c925 upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/a4905bf6ec859d9b9fb94a57c47bb5bde410822daf7c5af5bda1164a23a2c925 unpack002/out.upx
Files
-
c59fa83c81af0260aaa929eb47054e56.zip.zip
Password: infected
-
a4905bf6ec859d9b9fb94a57c47bb5bde410822daf7c5af5bda1164a23a2c925.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ