Behavioral task
behavioral1
Sample
341dc6d6fdb1b211dcfabfbda49a04d0e801265b42753cd2ab183843c13c89bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
341dc6d6fdb1b211dcfabfbda49a04d0e801265b42753cd2ab183843c13c89bb.exe
Resource
win10v2004-20220812-en
General
-
Target
341dc6d6fdb1b211dcfabfbda49a04d0e801265b42753cd2ab183843c13c89bb
-
Size
169KB
-
MD5
7a441cb2947ef7e8f8e402536f8913b1
-
SHA1
9c39d1b864b4be62e92dfaf2be0bd1ca22187d4d
-
SHA256
341dc6d6fdb1b211dcfabfbda49a04d0e801265b42753cd2ab183843c13c89bb
-
SHA512
e244d60f4f27a88a1aa68c834559696281dcbabdb01ad3f85a993b2fc34b0e78818bb463befcbc9162de7803d43921d5751f8871a9021d51f8afbe1d8941965b
-
SSDEEP
3072:87ZHZPfRO+MYFK7EKjAQktstU6a0HKhxNMqnwN6AzSFKEEwbv:aZBfqPEKUQktstP/HKhrbwNhzWEwbv
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
341dc6d6fdb1b211dcfabfbda49a04d0e801265b42753cd2ab183843c13c89bb.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 122KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ