Behavioral task
behavioral1
Sample
4c96714b835e4c0408b8dec3aa1ebf4cacc8529f973d3e7c7468c56bb9ba030c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c96714b835e4c0408b8dec3aa1ebf4cacc8529f973d3e7c7468c56bb9ba030c.exe
Resource
win10v2004-20241007-en
General
-
Target
4c96714b835e4c0408b8dec3aa1ebf4cacc8529f973d3e7c7468c56bb9ba030c
-
Size
86KB
-
MD5
644cf7df2b258f006fd8203786b24842
-
SHA1
48a522a6c258734010684f08d87e9ae9a44a5e8b
-
SHA256
4c96714b835e4c0408b8dec3aa1ebf4cacc8529f973d3e7c7468c56bb9ba030c
-
SHA512
b381686e464f9ef1caacf86dc2bb7d3cefde31621ab152a8126c9a8b947899b266fbb686fa296b9608298254b9b0a8c91eedbc137917141ba66c6c966ec17968
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5Kw0:fnyiQSox5Kw0
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c96714b835e4c0408b8dec3aa1ebf4cacc8529f973d3e7c7468c56bb9ba030c
Files
-
4c96714b835e4c0408b8dec3aa1ebf4cacc8529f973d3e7c7468c56bb9ba030c.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE