Behavioral task
behavioral1
Sample
77f5061fd1fee567ec3b455a70cfec41f2ec2474c30e2e982e246668086051a1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77f5061fd1fee567ec3b455a70cfec41f2ec2474c30e2e982e246668086051a1.exe
Resource
win10v2004-20220901-en
General
-
Target
77f5061fd1fee567ec3b455a70cfec41f2ec2474c30e2e982e246668086051a1
-
Size
86KB
-
MD5
1507334f398ea1d5f8d3408b54481b56
-
SHA1
000795fb23ce572e7da36f4b9d0a0bf75e274abf
-
SHA256
77f5061fd1fee567ec3b455a70cfec41f2ec2474c30e2e982e246668086051a1
-
SHA512
8272f079d81f19568f79c8ef6fd14c5d465b811f9d9ce14bf6a6cd2cc233d3258e644de14f3626a22469564384fceb22ee863b51b872e76502764c02a68832da
-
SSDEEP
1536:ksLxOGEQwIDnPlpne809Vynd2X+BVYnDq/WeWGqjaOL5Rmwur+ChffokCuO3:koOnQXDPXC9sndVBV0WqW3+ChfwrP
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
77f5061fd1fee567ec3b455a70cfec41f2ec2474c30e2e982e246668086051a1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.DATA Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
...... Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE