Behavioral task
behavioral1
Sample
131507f8d8b0f12b3ef5500ba76b7750a99d2f533a368933fb8a75b7d33b59b9N.exe
Resource
win7-20240903-en
General
-
Target
131507f8d8b0f12b3ef5500ba76b7750a99d2f533a368933fb8a75b7d33b59b9N
-
Size
108KB
-
MD5
6675f4f0201ed5ec28a485d54fa2b770
-
SHA1
a1adce10c934db6b75ab3949e44118897dce94c0
-
SHA256
131507f8d8b0f12b3ef5500ba76b7750a99d2f533a368933fb8a75b7d33b59b9
-
SHA512
00c99dd59de139079ddc3e6a2df1d77cc0d807d61a365a7f558eb0ea1292a7a9144b2352ddeff87e67cd3c5809193fc5fb6a0a01d2301a2db57f0bbbba35db2a
-
SSDEEP
3072:hUoIAkeF0RNyreZ8PRmqIZq9awE0ctUiQF2vUHFe+0AkyyDfEmU0RFWW+:eW
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 131507f8d8b0f12b3ef5500ba76b7750a99d2f533a368933fb8a75b7d33b59b9N unpack001/out.upx
Files
-
131507f8d8b0f12b3ef5500ba76b7750a99d2f533a368933fb8a75b7d33b59b9N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ