Behavioral task
behavioral1
Sample
abd76621794c56ee6ae4b4bbd511624859f63aa9e073f03e8c94b56bcde165d0.exe
Resource
win7-20240903-en
General
-
Target
abd76621794c56ee6ae4b4bbd511624859f63aa9e073f03e8c94b56bcde165d0
-
Size
12.1MB
-
MD5
1037e065acaf19e6a54459b65b453642
-
SHA1
800fc04f1ae393bd8a2c2ea097e8d4e8eb08d9db
-
SHA256
abd76621794c56ee6ae4b4bbd511624859f63aa9e073f03e8c94b56bcde165d0
-
SHA512
e74f0ddcd99e007db3504a143b4f80ac666ed1156e24023fcfacdac953574ae4ac12d52fcaef9a189bdb4eb5dbcb6b684138689d15dffc4b408c641b413176dc
-
SSDEEP
393216:mBmXVS6hhWwif2DxDGN9bCzdist5kFuQE05wDM:RX1WVAuIzV/kFuQ15wDM
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource abd76621794c56ee6ae4b4bbd511624859f63aa9e073f03e8c94b56bcde165d0 unpack001/out.upx
Files
-
abd76621794c56ee6ae4b4bbd511624859f63aa9e073f03e8c94b56bcde165d0.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 940KB - Virtual size: 936KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22.7MB - Virtual size: 22.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ