Behavioral task
behavioral1
Sample
4d2b8c0448f5ebcb296bb1028ddce6b5a7b4e4ef962347fc06e7b52159964603.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4d2b8c0448f5ebcb296bb1028ddce6b5a7b4e4ef962347fc06e7b52159964603.exe
Resource
win10v2004-20240802-en
General
-
Target
4d2b8c0448f5ebcb296bb1028ddce6b5a7b4e4ef962347fc06e7b52159964603
-
Size
91KB
-
MD5
50e54d1cbcaf9c423c87d5e5405e85d2
-
SHA1
f24d7ad4f56158fa10fdad328e3f72656e3f4ea2
-
SHA256
4d2b8c0448f5ebcb296bb1028ddce6b5a7b4e4ef962347fc06e7b52159964603
-
SHA512
2c61b09cabae305a355429cf3693d20266e99f6f164ee2cefaeaa636e68ae47e8ca9860bcf5667f56b4a5893ccaf7365c5717cb1568fed9c585c313cbc96537f
-
SSDEEP
1536:ERsjdf1aM67v32Z9x5nouy8VTuRsjdf1aM67v32Z9x5nouy8VTm:EOaHv3YpoutNuOaHv3YpoutNm
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d2b8c0448f5ebcb296bb1028ddce6b5a7b4e4ef962347fc06e7b52159964603
Files
-
4d2b8c0448f5ebcb296bb1028ddce6b5a7b4e4ef962347fc06e7b52159964603.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE