Behavioral task
behavioral1
Sample
edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38.exe
Resource
win7-20241010-en
General
-
Target
edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38
-
Size
89KB
-
MD5
96cbb2fc5b484a76ea49d10ff7d7ffe6
-
SHA1
13bab90afe45d7641bcbd2c7f2991edb1855bf97
-
SHA256
edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38
-
SHA512
cc4c30708d701a19f56d7134d906c5d601b0fa692771df0e21ef65d07414dfbdb46726c05d1c3564feb6d5796b3c3805c8f1c42648f03b36d29d768b7a6d29a7
-
SSDEEP
1536:Y1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:M+4MJIkLZJNAQ9Jo9e
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38
Files
-
edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE