Behavioral task
behavioral1
Sample
1cd86331145bbe31affc45efc6e9c13adbe8a6e78d53b42dec7114181dc7a599.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cd86331145bbe31affc45efc6e9c13adbe8a6e78d53b42dec7114181dc7a599.exe
Resource
win10v2004-20220812-en
General
-
Target
1cd86331145bbe31affc45efc6e9c13adbe8a6e78d53b42dec7114181dc7a599
-
Size
5KB
-
MD5
64d93768e830691bb87a9cb14e5a6f20
-
SHA1
8ff3c60ac10946cc2b7f7e0a763b981e8b91d2da
-
SHA256
1cd86331145bbe31affc45efc6e9c13adbe8a6e78d53b42dec7114181dc7a599
-
SHA512
b8d59dbde303e32b13657ae64009387012501d59962fa3faca09020c3f5559746bde22ec01df84caf29601cc4cf2637888c202b4a03be4522bd3db6bf4a29f68
-
SSDEEP
96:bSv110GxW2FjJYPmVI+V9IGjSJGs+K1C+Rv2aKb43dkU:bSv110GPdYPmVI+UGj8C+RPj3dkU
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1cd86331145bbe31affc45efc6e9c13adbe8a6e78d53b42dec7114181dc7a599.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE