Behavioral task
behavioral1
Sample
4fb571cce2e43a4b52873acf9bc64bba1e794e3fcc7cf4d2a87d0ca698777901.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4fb571cce2e43a4b52873acf9bc64bba1e794e3fcc7cf4d2a87d0ca698777901.exe
Resource
win10v2004-20220901-en
General
-
Target
4fb571cce2e43a4b52873acf9bc64bba1e794e3fcc7cf4d2a87d0ca698777901
-
Size
42KB
-
MD5
64d718a6d04db0171e42c2013c96dd44
-
SHA1
9401ad49d924b0a26f9d01bbbb79f3221fd71823
-
SHA256
4fb571cce2e43a4b52873acf9bc64bba1e794e3fcc7cf4d2a87d0ca698777901
-
SHA512
82c5275794c4923a1c23d8eabe36f34e7a7b14c444c1933b9ebc60f82933d06dce5d0e13790e08b1d7c86bedb55a7028e7250f646f99e9c1b6023ed0c1c01943
-
SSDEEP
768:1Q3kFOIimZ9vX3hIwNUXqxqkIQgSc/VpcA6Cjlo/uuJnBxJh7mmtXVX5Xgb:1Q3PI9Z9vXacqNG0PczCW/LxJh7jXVX+
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4fb571cce2e43a4b52873acf9bc64bba1e794e3fcc7cf4d2a87d0ca698777901.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ