Behavioral task
behavioral1
Sample
c1a6167996287344182a204c9b7350f137b067a7e5e31065ac9f82fa6b2e15a3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c1a6167996287344182a204c9b7350f137b067a7e5e31065ac9f82fa6b2e15a3.exe
Resource
win10v2004-20220812-en
General
-
Target
c1a6167996287344182a204c9b7350f137b067a7e5e31065ac9f82fa6b2e15a3
-
Size
9KB
-
MD5
a0872213df9595006c60943e38862c71
-
SHA1
d68654aba24134eaf2fb3b9188fec949ae4ed778
-
SHA256
c1a6167996287344182a204c9b7350f137b067a7e5e31065ac9f82fa6b2e15a3
-
SHA512
e9a278b4c8db5fe601f044a77576e2ee2823f35cf3488e9eff49bff9c89b69a6bdb0ad1d4030e5b31e04092a7277d8732ae465922b2130f2b8fa029067cf0d9b
-
SSDEEP
192:NjG63LaKnIwF+G12P52DDOJ7ieIuQI+lkHMu:NjG6baKIwFv12P5iDOlieRlqAMu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c1a6167996287344182a204c9b7350f137b067a7e5e31065ac9f82fa6b2e15a3.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE