Behavioral task
behavioral1
Sample
e2cccb1d9551d2abf7e98baae1d29a99e14a4f851016e1eb7efb1bd7ddcb3daf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e2cccb1d9551d2abf7e98baae1d29a99e14a4f851016e1eb7efb1bd7ddcb3daf.dll
Resource
win10v2004-20220812-en
General
-
Target
e2cccb1d9551d2abf7e98baae1d29a99e14a4f851016e1eb7efb1bd7ddcb3daf
-
Size
16KB
-
MD5
74b3a8d8f63d9cdd30f55d29a3ef0286
-
SHA1
950e8d3358d7edd9b3056582a7b43d27d22353aa
-
SHA256
e2cccb1d9551d2abf7e98baae1d29a99e14a4f851016e1eb7efb1bd7ddcb3daf
-
SHA512
833e8f80afcb3a26bee061ac08363a8ac5ba7eccec77a71b227443e903983cb17e774411f5888bdfbad2dfe2b0d5845bab4d040d02ef6075acf627cb28662620
-
SSDEEP
384:ndDESMeMa6fnOWTEoA6Xp72ktzh3hT87v:dIiMJv7T+WpyOFhAD
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e2cccb1d9551d2abf7e98baae1d29a99e14a4f851016e1eb7efb1bd7ddcb3daf.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ