Behavioral task
behavioral1
Sample
cf366a0bce253f293114a224e93e518684d6a0396c8f1c26f6415589da55c3c2N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cf366a0bce253f293114a224e93e518684d6a0396c8f1c26f6415589da55c3c2N.exe
Resource
win10v2004-20241007-en
General
-
Target
cf366a0bce253f293114a224e93e518684d6a0396c8f1c26f6415589da55c3c2N
-
Size
4.1MB
-
MD5
75aefd3b14003601c90be01a669e2ce0
-
SHA1
59f1616d16a3c456e7d49f4d166875978b9ce2e3
-
SHA256
cf366a0bce253f293114a224e93e518684d6a0396c8f1c26f6415589da55c3c2
-
SHA512
7f0c7501ef0d2bed0a2702d2d44ea26c0d6c86d10ea87fb8c5e92187c048e2cffa7a10e4f6bb2c89148adead758c45b927f8358e26a8139f61e13dc816f74f2f
-
SSDEEP
98304:EZB4oZB40ZB4FZB4FZB4jZB4FZB4FZB4uZB4uZB4uZB4uZB4WWWWccccV:6424K4Z4Z4P4Z4Z4k4k4k4k4WWWWcccO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf366a0bce253f293114a224e93e518684d6a0396c8f1c26f6415589da55c3c2N
Files
-
cf366a0bce253f293114a224e93e518684d6a0396c8f1c26f6415589da55c3c2N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.b Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 74KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 143KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tXJuJ Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ