Behavioral task
behavioral1
Sample
ee59fed548e143b98c3ed734bd583219d63dc197be1609f7e4b6d97979976e0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee59fed548e143b98c3ed734bd583219d63dc197be1609f7e4b6d97979976e0e.exe
Resource
win10v2004-20220812-en
General
-
Target
ee59fed548e143b98c3ed734bd583219d63dc197be1609f7e4b6d97979976e0e
-
Size
5KB
-
MD5
77fe6103cd009eb22255a8a973402db8
-
SHA1
07ad8d7aa2d8dacc2a02a178be1995e41d6595f5
-
SHA256
ee59fed548e143b98c3ed734bd583219d63dc197be1609f7e4b6d97979976e0e
-
SHA512
ccefa531a0cfdbe0dcddef493301c8ea9d8f84bfa9c621d75c3fac97960a4012b0bb271b39662dfa6e7f49f0a1de7fad18ed658df8018c4c51e64a09b18aa5a9
-
SSDEEP
96:UfG5561Zok7mastQP0gQoDs9O92vM7pW3+vFFDXkLkBgGfZKYo:SGD61ZoqmXt87QoDeTAu+9JSkBRRi
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ee59fed548e143b98c3ed734bd583219d63dc197be1609f7e4b6d97979976e0e.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE