Behavioral task
behavioral1
Sample
527b4d39fe7a5c23c214c1c60130e42eddef69f1f5837a790862b8bae1bf0baaN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
527b4d39fe7a5c23c214c1c60130e42eddef69f1f5837a790862b8bae1bf0baaN.exe
Resource
win10v2004-20240802-en
General
-
Target
527b4d39fe7a5c23c214c1c60130e42eddef69f1f5837a790862b8bae1bf0baaN.exe
-
Size
94KB
-
MD5
86ea0b8e3f8388ca2dc67ee0e002d5b0
-
SHA1
0f1069c2462af2da90ad8e67c6dfcc2c03710f27
-
SHA256
527b4d39fe7a5c23c214c1c60130e42eddef69f1f5837a790862b8bae1bf0baa
-
SHA512
d5211589258312f760dc27c02622ecfaa0a0e4bc79abec96d0ff35782f996787fa21ed24f70dc1fe658f4f334895cae5d51de77317b7964bdad9304a8ca31fd5
-
SSDEEP
1536:QSM+teqoM292Rd185ZT9FveYGX6XNWr52N8gi6sVwroR+QoobRGYS1ckYJ0jmJ:QSM+4qCYbGT46XQESrVX+SbcYS1cke
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 527b4d39fe7a5c23c214c1c60130e42eddef69f1f5837a790862b8bae1bf0baaN.exe unpack001/out.upx
Files
-
527b4d39fe7a5c23c214c1c60130e42eddef69f1f5837a790862b8bae1bf0baaN.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.bss Size: - Virtual size: 111KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE