Behavioral task
behavioral1
Sample
d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609.exe
Resource
win10v2004-20240508-en
General
-
Target
d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609
-
Size
69KB
-
MD5
7265a8571623e538563212b06d4aefea
-
SHA1
c655b97f2461b931b3f4b10421c42fa1749c1ed3
-
SHA256
d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609
-
SHA512
4de964d224979ddaf2d6e5d6356ec91133f43902971200461b19d300b399f7e723e4e1567979a41f142b3cf2148a6e926af14b19a6fb51a0bdf2c7296d83ebe6
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxc:fnyiQSoF
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609
Files
-
d1757ba7eda0334e7823a9cb8c7b469972978f6db7cc95887b28d8f4ee984609.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE