Static task
static1
Behavioral task
behavioral1
Sample
payment.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
payment.exe
-
Size
318KB
-
MD5
e8d71994c54e4a7538f3beaf6e2e8c1e
-
SHA1
48bfcf8b3455c62e88a7e3b38a720809be7cab32
-
SHA256
ca9f6a11a9200ccde207ba921ae6a6dfef747f88934b90404e779a314ef92ea2
-
SHA512
9dd21bce296f5760278de1942899dbfc0c310a83a27aafd7cde7a2e7f38f1c11d0f4657b993de70fdf4871628171763447d6f2e4f522416dbbf0c0440f705a1f
Score
8/10
Malware Config
Signatures
-
UPX packed file 1 IoCs
Detects executables packed with UPX/modified UPX open source packer.
Processes:
resource yara_rule sample upx
Files
-
payment.exe.exe windows x86