Behavioral task
behavioral1
Sample
bcf779641665c8472844310e067c689e54076a0ed8debe96878ce979a02ae386.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcf779641665c8472844310e067c689e54076a0ed8debe96878ce979a02ae386.exe
Resource
win10v2004-20220812-en
General
-
Target
bcf779641665c8472844310e067c689e54076a0ed8debe96878ce979a02ae386
-
Size
5KB
-
MD5
fa6c3e00f06a38f388d651b6b13b1edb
-
SHA1
4ef1b1c4a4b11a5b9508152c1675d7cd22eebc8a
-
SHA256
bcf779641665c8472844310e067c689e54076a0ed8debe96878ce979a02ae386
-
SHA512
c9a55e237e7f0bb8d7d168388a58d28697074c9ef8c4734c1abf93af7d8229629a2ea8401dc405b9ad59b5a6322e6f7b64af4d6e9e2f3d6c9b67189c16125516
-
SSDEEP
96:IYHW7ilF2Wa7Dpxn6i2CCwPN+pU7pUnPU4BVJF29isB:1H7z2WGoiCwPNNKFBxKB
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bcf779641665c8472844310e067c689e54076a0ed8debe96878ce979a02ae386.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE