Behavioral task
behavioral1
Sample
03a4bf52a29a887804cb6ff2f085c6c176b309d7b3e4c7309520591e0cee97a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03a4bf52a29a887804cb6ff2f085c6c176b309d7b3e4c7309520591e0cee97a6.exe
Resource
win10v2004-20241007-en
General
-
Target
03a4bf52a29a887804cb6ff2f085c6c176b309d7b3e4c7309520591e0cee97a6
-
Size
91KB
-
MD5
d46e1968ce0c9ee3ad1d260a694a8834
-
SHA1
58cad6af51bab8ed01e9269224d8388b1a341c07
-
SHA256
03a4bf52a29a887804cb6ff2f085c6c176b309d7b3e4c7309520591e0cee97a6
-
SHA512
2732dbdd83a2eee7c33a70f46bd862919eb8a841fcc8d8ccaea14cb90b8466802b531e6cf2431a15b33e008a77a340f50f95864cf200858282a73bbf198801ba
-
SSDEEP
1536:XRsjdLaslqdBXvTUL0Hnouy8VjT4RsjdLaslqdBXvTUL0Hnouy8Vjn:XOJKqsout9EOJKqsout9n
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03a4bf52a29a887804cb6ff2f085c6c176b309d7b3e4c7309520591e0cee97a6
Files
-
03a4bf52a29a887804cb6ff2f085c6c176b309d7b3e4c7309520591e0cee97a6.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE