Static task
static1
Behavioral task
behavioral1
Sample
999d9587fb9831e06f376b9054c641fc31b67096b9c9f859793b9cbc902acf84.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
999d9587fb9831e06f376b9054c641fc31b67096b9c9f859793b9cbc902acf84.exe
Resource
win10v2004-20220414-en
General
-
Target
999d9587fb9831e06f376b9054c641fc31b67096b9c9f859793b9cbc902acf84
-
Size
1.2MB
-
MD5
da02266f9b13ebae7a39d285ec681a84
-
SHA1
93c2b86b4411c97960a02d53f5221fdbd44b0a47
-
SHA256
999d9587fb9831e06f376b9054c641fc31b67096b9c9f859793b9cbc902acf84
-
SHA512
fbc6f710d921694855aaf7a22c38c81ef4f74441c85ce261e85cafe5021497adb738c3ff3a8b1a04ae583ff8d9f9d2e00842680798a1d63dd85cd7fce8fecea4
-
SSDEEP
24576:LjUAj8Bnq4eap0ofEQKHSqRJou/KmH4ETgtgrkCz9CErKCdj0:LfWq457Bo7eu1H58CzdX
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
999d9587fb9831e06f376b9054c641fc31b67096b9c9f859793b9cbc902acf84.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 936KB - Virtual size: 933KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 745KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ