Behavioral task
behavioral1
Sample
Worm.Win32.Mydoom.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Worm.Win32.Mydoom.exe
Resource
win10v2004-20240802-en
General
-
Target
Worm.Win32.Mydoom.pz-3b486168388e5176f890d1e706c1c0cfe738758fc10a34d036df693275963031N
-
Size
41KB
-
MD5
193d0a244c8df9d48e37e8c0de694790
-
SHA1
61ad5f4bf01f8ed36a4ccef66be6ee440b0bcfa7
-
SHA256
3b486168388e5176f890d1e706c1c0cfe738758fc10a34d036df693275963031
-
SHA512
00cef3add273e01306421d5600fc960a98b333ff1d6756704aa39cec993750f012d740c880ceb2a9db2f7d63f4be461d2ca5335bde2705a67d2854376a78f8ad
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Worm.Win32.Mydoom.pz-3b486168388e5176f890d1e706c1c0cfe738758fc10a34d036df693275963031N
Files
-
Worm.Win32.Mydoom.pz-3b486168388e5176f890d1e706c1c0cfe738758fc10a34d036df693275963031N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 511B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE