Behavioral task
behavioral1
Sample
58fb9c4b7877858e858682b5a5c2a33e6b57563d71f816e7922d5d3117a0d6bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58fb9c4b7877858e858682b5a5c2a33e6b57563d71f816e7922d5d3117a0d6bf.exe
Resource
win10v2004-20220901-en
General
-
Target
58fb9c4b7877858e858682b5a5c2a33e6b57563d71f816e7922d5d3117a0d6bf
-
Size
4KB
-
MD5
50c510f06e138dc522eff07e79768300
-
SHA1
835f4f4d6e965961e531a92a2d84fe0b6f62be17
-
SHA256
58fb9c4b7877858e858682b5a5c2a33e6b57563d71f816e7922d5d3117a0d6bf
-
SHA512
9e7bfb242f094bb73ff66f161cba1c30eb4be780e35b4c1d325111f8a108127b4ff0bd36af1c6ff587b809e329678630486aa9e6a76db41b41578e977308d77d
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
58fb9c4b7877858e858682b5a5c2a33e6b57563d71f816e7922d5d3117a0d6bf.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE