Behavioral task
behavioral1
Sample
29d8a82d57c12f2102141e31a00722be848245a9e8d2328940ae1aff0af7dca4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
29d8a82d57c12f2102141e31a00722be848245a9e8d2328940ae1aff0af7dca4.exe
Resource
win10v2004-20220812-en
General
-
Target
29d8a82d57c12f2102141e31a00722be848245a9e8d2328940ae1aff0af7dca4
-
Size
97KB
-
MD5
07ed905fdfc7bbabcc7a0140975c8790
-
SHA1
c94b0a8e3f3c27527090e52b54e23b51aeae1b89
-
SHA256
29d8a82d57c12f2102141e31a00722be848245a9e8d2328940ae1aff0af7dca4
-
SHA512
238191d26b4337da02450762eb0de2e22485995792f72c5f5b46cdfeee86793385be72ddb740ed78f100a0ee433e87bb0c633dfe0e4299d4c70db6c9035f7484
-
SSDEEP
1536:x0/GtN4x+N78VwPVd3ccjzFkDuq7KQbyohWaLsAQFa6td3HWrte2NRl/hD:7T4i4aVN7jBnQby6LEx3W5R75V
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
29d8a82d57c12f2102141e31a00722be848245a9e8d2328940ae1aff0af7dca4.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 112KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ