Behavioral task
behavioral1
Sample
2c125563fbb395cd5b27ee81e87c7c18695be0a87661a9c2535f5622253cd5ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c125563fbb395cd5b27ee81e87c7c18695be0a87661a9c2535f5622253cd5ef.exe
Resource
win10v2004-20220901-en
General
-
Target
2c125563fbb395cd5b27ee81e87c7c18695be0a87661a9c2535f5622253cd5ef
-
Size
15KB
-
MD5
63dbec6e26d5457aa5db01c8ce6f8c47
-
SHA1
5037eda284e8961f505beadfd18aea8d4be1fa92
-
SHA256
2c125563fbb395cd5b27ee81e87c7c18695be0a87661a9c2535f5622253cd5ef
-
SHA512
b970cf9767f7d97c27ff6c6ccf7f850d1bc9f467a61e62d2b59099ad2d371e364c79e040a78a971ffdb5d4ea47577202d897ca1cfd8c43c8306d64ffc5891d50
-
SSDEEP
384:SjAj72QQix30wr5Nbo91EOfQ43xkstgGDYwUeG:6A32Qfn5RoHEAOSrG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
2c125563fbb395cd5b27ee81e87c7c18695be0a87661a9c2535f5622253cd5ef.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 196KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.bss Size: - Virtual size: 268B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ