Behavioral task
behavioral1
Sample
bdc21c0d0fa2b3f1e855a2da7d4b1c2891108b4bb8ec4dfd2da5f24e0c1a02a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdc21c0d0fa2b3f1e855a2da7d4b1c2891108b4bb8ec4dfd2da5f24e0c1a02a5.exe
Resource
win10v2004-20220812-en
General
-
Target
bdc21c0d0fa2b3f1e855a2da7d4b1c2891108b4bb8ec4dfd2da5f24e0c1a02a5
-
Size
6KB
-
MD5
ecddcb3aaa5d7cc9f11cb7f69e1fde0d
-
SHA1
1cbe2ba21dec57644055d8d535b0031bee4665e6
-
SHA256
bdc21c0d0fa2b3f1e855a2da7d4b1c2891108b4bb8ec4dfd2da5f24e0c1a02a5
-
SHA512
61c0c00570a6937d57b92b7a4eb2d94910cd3aecc01392688ad801eb84aa00349c9b40be87e561bd24b417d5e772fcdb2a0584bdae08ba86c54d12f4cf7b00db
-
SSDEEP
96:EYGR9q6NjAZm0jof+RcU1VEmnZwifGX4XDv69Im2yKUJBz6vuegOD:EhLnNjAZtoQp/ZEIz6v2yHJgWOD
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bdc21c0d0fa2b3f1e855a2da7d4b1c2891108b4bb8ec4dfd2da5f24e0c1a02a5.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE