Behavioral task
behavioral1
Sample
e5d745fa611d5a19a384d4f364bb612aca820ef83a2a80d13641d2b0cd8c2d99.exe
Resource
win7-20240729-en
General
-
Target
e5d745fa611d5a19a384d4f364bb612aca820ef83a2a80d13641d2b0cd8c2d99
-
Size
145KB
-
MD5
2cb7bcf20baa1d352e34a90a288c677f
-
SHA1
a076c87803aed700cf09af55db422e59f8784180
-
SHA256
e5d745fa611d5a19a384d4f364bb612aca820ef83a2a80d13641d2b0cd8c2d99
-
SHA512
ae90fb9e36d1b01ed1983997b3aa783e1a0f6f499fc111b0feb64515425391adc2185820bda456787a8c1dabef0350da692cf433724d8421c9a494188ddb67a1
-
SSDEEP
1536:CTWUnMdyGdyqWFx1cbb1mmOyMaQQyRy9lxBBF6QvfqFJHoZr1p1M1tDi6T98r:SnQ1XOyrQHQfB/HqMZr1oDi66r
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource e5d745fa611d5a19a384d4f364bb612aca820ef83a2a80d13641d2b0cd8c2d99 unpack001/out.upx
Files
-
e5d745fa611d5a19a384d4f364bb612aca820ef83a2a80d13641d2b0cd8c2d99.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ