Behavioral task
behavioral1
Sample
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
Resource
win10v2004-20241007-en
General
-
Target
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
-
Size
64KB
-
MD5
da7e3e0ba0416e585ed5b193b192755c
-
SHA1
311f0069519d5993d8fb6eca6e527404d8a10883
-
SHA256
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b
-
SHA512
0eb5d3425dd7f1cd4da84aae38ec8a26e0e1cf142e3595e87bbd22d250a902f6877d2cadc864164887b730b493c99b967c2553c15892fd47d6d2da60424a23fb
-
SSDEEP
768:rAUJmQCcmLCXQq6fsKiJYsIkjJVzqsVG5kuGKQLddOW/34WvLTkXWXzL:sUNHFKQbIkHvGMdOo40T7L
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe
Files
-
14aeba4ed10c161f9713ba70812eb30fd0ddf7d0f50fe17f1eedd578292fb28b.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE