Behavioral task
behavioral1
Sample
28699bc835568e4b34a52fab3ce19a81d9e4cfa375c4c6225712ba3783c88c53.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
28699bc835568e4b34a52fab3ce19a81d9e4cfa375c4c6225712ba3783c88c53.exe
Resource
win10v2004-20241007-en
General
-
Target
28699bc835568e4b34a52fab3ce19a81d9e4cfa375c4c6225712ba3783c88c53
-
Size
63KB
-
MD5
f38b77863edd34f621504f43de3f21f1
-
SHA1
08e45197c7a96f1767fb5336ce7557a9de317c85
-
SHA256
28699bc835568e4b34a52fab3ce19a81d9e4cfa375c4c6225712ba3783c88c53
-
SHA512
2f6cb7b3165c4c3171c24c65b7397d22cca158599c0c8cac3fa7808529485ec872ac43df3a07d0f2cf07bc7811f35ac7b8ca0c4059a5d8434d8ef65bc6bfd549
-
SSDEEP
768:LAUJmQCcmLCXQq6fsKiJYsIkjJVzqsVG5kuGyLddOW/CtNKB4Ejv:MUNHFKQbIkHvGtdO9K+Wv
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 28699bc835568e4b34a52fab3ce19a81d9e4cfa375c4c6225712ba3783c88c53
Files
-
28699bc835568e4b34a52fab3ce19a81d9e4cfa375c4c6225712ba3783c88c53.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE