Behavioral task
behavioral1
Sample
4fb6b5e463ff6ebc36129ee06ea9ab19b2e4c8f12bd46d07a538581b04ba05c5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4fb6b5e463ff6ebc36129ee06ea9ab19b2e4c8f12bd46d07a538581b04ba05c5N.exe
Resource
win10v2004-20240802-en
General
-
Target
4fb6b5e463ff6ebc36129ee06ea9ab19b2e4c8f12bd46d07a538581b04ba05c5N
-
Size
20KB
-
MD5
2dd4a8a4c467a278b74ce6d0e170e390
-
SHA1
de28c86ab95df2751020e3432af2b2edd144ab55
-
SHA256
4fb6b5e463ff6ebc36129ee06ea9ab19b2e4c8f12bd46d07a538581b04ba05c5
-
SHA512
e9ceb15ddab53b1bd4ac7413bdc453e0c31e78de5d48728aee3509ece44fc6a01cb15a36eaf119ee87982442fb624c38ac13c3fe3e1769f5979a60fed9cc9be3
-
SSDEEP
192:VjUWFh4fvYGIQnsA6psQXFaNJhLkwcud2DH9VwGfct1hM5EKU2b:9KE7pXaNJawcudoD7U7S5Ev2b
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4fb6b5e463ff6ebc36129ee06ea9ab19b2e4c8f12bd46d07a538581b04ba05c5N
Files
-
4fb6b5e463ff6ebc36129ee06ea9ab19b2e4c8f12bd46d07a538581b04ba05c5N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE