Behavioral task
behavioral1
Sample
69c341a4d77b21505ebac5804752ac1b944bf8d518f510974833acc30d6e355e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69c341a4d77b21505ebac5804752ac1b944bf8d518f510974833acc30d6e355e.exe
Resource
win10v2004-20240508-en
General
-
Target
69c341a4d77b21505ebac5804752ac1b944bf8d518f510974833acc30d6e355e
-
Size
576KB
-
MD5
6b75c75ba58ec42e16ca3dda3525f4ea
-
SHA1
9c29a59ce8692a6483c8d1a82d7dd18b16b35704
-
SHA256
69c341a4d77b21505ebac5804752ac1b944bf8d518f510974833acc30d6e355e
-
SHA512
a0862ffa4a829bd1be3d6a11a226e191c2e1739717b16cb39ab030e22c62fb4698ead67945d2976efb492a2b3c483c69b551b5ed2fa2715bc9bcae4c2c349470
-
SSDEEP
12288:+NWPkHlUkErBuxQ4uzi6d6dL/yiXLzeMdK6io8levy0FhVlpzkzDDoSy:+NWPkHlUfBgpuPdWzyuDTifgyWl/
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 69c341a4d77b21505ebac5804752ac1b944bf8d518f510974833acc30d6e355e
Files
-
69c341a4d77b21505ebac5804752ac1b944bf8d518f510974833acc30d6e355e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 3.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 572KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE