Behavioral task
behavioral1
Sample
0757734c9fb2b078e9836c3c8ad03a297862e261dd0e6dfe6477f5827608353dN.exe
Resource
win7-20240903-en
General
-
Target
0757734c9fb2b078e9836c3c8ad03a297862e261dd0e6dfe6477f5827608353dN
-
Size
92KB
-
MD5
9d8f276c044aca8b655e76fff7383a40
-
SHA1
2891d5734573d44c5ee09783c73f2ccd41ad6f22
-
SHA256
0757734c9fb2b078e9836c3c8ad03a297862e261dd0e6dfe6477f5827608353d
-
SHA512
40e6781b0743a0e832ab7e91bf66b358ccd3226d03d6316715224ad2f63c834dee0a84eab52d613150e34cd920641669a11bb2de5dd3b1c4e92b98c6192d7272
-
SSDEEP
1536:CTW7JJ7TU2e/WVChdd49k5b8T8CGUNjfCdDb8:ho2etddN8T8E0Zb8
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 0757734c9fb2b078e9836c3c8ad03a297862e261dd0e6dfe6477f5827608353dN unpack001/out.upx
Files
-
0757734c9fb2b078e9836c3c8ad03a297862e261dd0e6dfe6477f5827608353dN.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ