Behavioral task
behavioral1
Sample
264a34f4975d86b3b13785d46a97c465ae332160c70f901cff050e1b0e75a20d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
264a34f4975d86b3b13785d46a97c465ae332160c70f901cff050e1b0e75a20d.exe
Resource
win10v2004-20220812-en
General
-
Target
264a34f4975d86b3b13785d46a97c465ae332160c70f901cff050e1b0e75a20d
-
Size
13KB
-
MD5
f2eefab06d4fcfcdbacef469d8177c14
-
SHA1
55d1b9121b99a8336d5b34f1b644fe1154e1072d
-
SHA256
264a34f4975d86b3b13785d46a97c465ae332160c70f901cff050e1b0e75a20d
-
SHA512
5af69f551b07e933f651f2fa958506d6d250190c98b8ac43c8e83cd6ea3ce74bb706cd615c0e92714ab218c9d2e0878bc107f949b2bdff8efb0961c114201dd4
-
SSDEEP
384:CgIf066Mg1OwlORUJzZ+w0wSMaGCq3SG+cztw9Zb:C7M66Mg8Kt+wInXklvUb
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
264a34f4975d86b3b13785d46a97c465ae332160c70f901cff050e1b0e75a20d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.bss Size: - Virtual size: 268B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ