Behavioral task
behavioral1
Sample
392d3c44813066beca45795a918769e744714b6382a5a5dbe2e1596db9ea84bb.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
392d3c44813066beca45795a918769e744714b6382a5a5dbe2e1596db9ea84bb.exe
Resource
win10v2004-20240802-en
General
-
Target
392d3c44813066beca45795a918769e744714b6382a5a5dbe2e1596db9ea84bb
-
Size
94KB
-
MD5
3b17664efd08b4d668418e1950c6ea5a
-
SHA1
35909c523e1997fd92bd20e04beda3bbeebef4b7
-
SHA256
392d3c44813066beca45795a918769e744714b6382a5a5dbe2e1596db9ea84bb
-
SHA512
d78fd1ee5f353a484394a5fa93b8fe3412266a03cdbb36272fb4f466989a7601d63541fc44c621cd00d786cf70341d8885f6254d08552ea1356706371e1baf06
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5jVBChFd7naVF5sQwyaq6ChFd7naA:fnyiQSox5L
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 392d3c44813066beca45795a918769e744714b6382a5a5dbe2e1596db9ea84bb
Files
-
392d3c44813066beca45795a918769e744714b6382a5a5dbe2e1596db9ea84bb.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE