Behavioral task
behavioral1
Sample
5a311b16241d49fd939417edcc8656e5cc943ca66b27cd21b96d5ba772af1395.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5a311b16241d49fd939417edcc8656e5cc943ca66b27cd21b96d5ba772af1395.exe
Resource
win10v2004-20220721-en
General
-
Target
5a311b16241d49fd939417edcc8656e5cc943ca66b27cd21b96d5ba772af1395
-
Size
213KB
-
MD5
00118aabbb7766de27bcf2623009b2b0
-
SHA1
ed925928b0def26435b493b40efa71a0552999d4
-
SHA256
5a311b16241d49fd939417edcc8656e5cc943ca66b27cd21b96d5ba772af1395
-
SHA512
3fa5e923e92ef16910713c0c6b2d37c1b9af550f54e03e49ef0aff9dca5cbc18c3b7458922c8d2fe67a91fdb0ed52033445b7965d92b955137f3a353e38339e3
-
SSDEEP
3072:/AtzgYFIN2Qu/M5WHIb+RTcL5gSfDa2mnYkIueJ3PpVrijl0DS/NuNdBG:4hFINn+MEzRMgSf27kBPpVrix0G/Nq
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5a311b16241d49fd939417edcc8656e5cc943ca66b27cd21b96d5ba772af1395.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 236KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ