Behavioral task
behavioral1
Sample
62451014bb6db309ee9155c56d6780de9af6c55206c8322d005f120c2a8ce889.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
62451014bb6db309ee9155c56d6780de9af6c55206c8322d005f120c2a8ce889.exe
Resource
win10v2004-20240802-en
General
-
Target
6aa1e3f15e1cd59b5247d13f8625f93b.zip
-
Size
40KB
-
MD5
a08aeb542c20170b112cd34e7703c8fd
-
SHA1
e4f1cf21ff573ff27e6603aa38ffff7dd484a3d1
-
SHA256
43703333879844d6eb35bea913252352532459ba552bd21a52a98bcc1cecffdf
-
SHA512
8551d6356aa4d497ebfb4a5d6d75927ab0ad3a8a702cce25897c586b89f77b89fc3c12a1c05bf8831a2a00022bf797e9ee55c5860ee7fc5c63141dbaa48b543f
-
SSDEEP
768:UOyyd77yEarM5zDbZqOl+6ASqbv8k81tj17IOVSXZzfzcx:p7yEaY9DbnlFfdkoJ7WE
Malware Config
Signatures
-
resource yara_rule static1/unpack001/62451014bb6db309ee9155c56d6780de9af6c55206c8322d005f120c2a8ce889 upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/62451014bb6db309ee9155c56d6780de9af6c55206c8322d005f120c2a8ce889 unpack002/out.upx
Files
-
6aa1e3f15e1cd59b5247d13f8625f93b.zip.zip
Password: infected
-
62451014bb6db309ee9155c56d6780de9af6c55206c8322d005f120c2a8ce889.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ