Behavioral task
behavioral1
Sample
971ab5778c714a68a9e17da914a05c7acb18f06a0725d01c0c3c2007b43f74df.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
971ab5778c714a68a9e17da914a05c7acb18f06a0725d01c0c3c2007b43f74df.exe
Resource
win10v2004-20240802-en
General
-
Target
50b933d2546c8b9fa79f35e2811a564a.zip
-
Size
42KB
-
MD5
7b33a75ebac0d8b22b1abc441fff8ca5
-
SHA1
d1ebcf6b6a2ba7c158c71d0a16ab86450ecb5f2e
-
SHA256
3d6649ea0fd238c9fe6cbd4043cef80a3330d7082b9721ceb298b64d4fe7b052
-
SHA512
c11ea23cca8e93dc1056d0c8d5082d17cc9a54d814a40c1b6dccc907e5defe9cea4de704b8229dd271d4f95ffd1ea97b320e73fd6fb1be586604669bc2241f2d
-
SSDEEP
768:r/sTL66kpKN6gAzBVmehayfWQltwOCAD0gjL1KLkAhBM9nJf:r07EgAzBweh9fWQnwOnrf1KLkVj
Malware Config
Signatures
-
resource yara_rule static1/unpack001/971ab5778c714a68a9e17da914a05c7acb18f06a0725d01c0c3c2007b43f74df upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/971ab5778c714a68a9e17da914a05c7acb18f06a0725d01c0c3c2007b43f74df unpack002/out.upx
Files
-
50b933d2546c8b9fa79f35e2811a564a.zip.zip
Password: infected
-
971ab5778c714a68a9e17da914a05c7acb18f06a0725d01c0c3c2007b43f74df.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ