time
Behavioral task
behavioral1
Sample
d4d20ca19126fee2cbb91387097902a0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4d20ca19126fee2cbb91387097902a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4d20ca19126fee2cbb91387097902a0N
-
Size
20KB
-
MD5
d4d20ca19126fee2cbb91387097902a0
-
SHA1
3cd82f688e4347d2c7e9212108978f793ce01bea
-
SHA256
53491b625c67bc67688908aa7c65338f0ef82a740d858f9140565ff289adcbcb
-
SHA512
5c80fde86f8db970f174f5b472e77e19ea1f9192b43d2ba89c67bcc877cc1a3f10641a52674816d509dfcc547bd647dc56469756b73f98e03f6877befbea3d3a
-
SSDEEP
384:givYw/FSXcqHVPR7NTknqfhmeeinAZ2qykHAyeo6GFZ2h2w:gpYSMqHaqfhmeeiAZ23we2n
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource d4d20ca19126fee2cbb91387097902a0N unpack001/out.upx
Files
-
d4d20ca19126fee2cbb91387097902a0N.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE