Behavioral task
behavioral1
Sample
f6ee169a7555549f2418ec45bafc0ca376b5481f8e8a68b8efb531788c289a97.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f6ee169a7555549f2418ec45bafc0ca376b5481f8e8a68b8efb531788c289a97.exe
Resource
win10v2004-20220812-en
General
-
Target
f6ee169a7555549f2418ec45bafc0ca376b5481f8e8a68b8efb531788c289a97
-
Size
187KB
-
MD5
81404256f98a45571401f7832d4ebfc1
-
SHA1
40ba043526dd25fe82e2b6b9154e93905cb8bbe4
-
SHA256
f6ee169a7555549f2418ec45bafc0ca376b5481f8e8a68b8efb531788c289a97
-
SHA512
2502c6e8feb3d12adb0f09937952348eac1ffd3dc3629d880ebf2b566a1d3d2a9d7ac8998b7a3dca931bf88958ae94b7bda51567c92891300b15cb88f531a340
-
SSDEEP
3072:kZplO9KA556gsHMEHo2hgAY1HybOmub9BIt5HSOU/+P5HfpUtzDY/D+OJJgbApni:mc556gsHMEIlt1HSI9WLHSOK+PbEAJJ/
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f6ee169a7555549f2418ec45bafc0ca376b5481f8e8a68b8efb531788c289a97.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 300KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 174KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ