Behavioral task
behavioral1
Sample
bd4056b3e0f132f8b2fe6c07bece3d0e83fc27cf5a37f48d5dfdb635eef4bc54.exe
Resource
win7-20240708-en
General
-
Target
bd4056b3e0f132f8b2fe6c07bece3d0e83fc27cf5a37f48d5dfdb635eef4bc54
-
Size
47KB
-
MD5
80d7ff492a22d5c295084545f87e2c07
-
SHA1
d6f46aa6aec4d9dfedbdc7016b699b7c3c7af287
-
SHA256
bd4056b3e0f132f8b2fe6c07bece3d0e83fc27cf5a37f48d5dfdb635eef4bc54
-
SHA512
6bfb54a883f8057cbb61f9857a762bd13f8955845b30549707395339e935f3c666d74b7b7fd7f69194cf63a23f770b12548fc3ed0ffd4916eb00e299981d0cc4
-
SSDEEP
768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJsP:CTW7JJZENTNyoKIKMP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource bd4056b3e0f132f8b2fe6c07bece3d0e83fc27cf5a37f48d5dfdb635eef4bc54 unpack001/out.upx
Files
-
bd4056b3e0f132f8b2fe6c07bece3d0e83fc27cf5a37f48d5dfdb635eef4bc54.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ