Behavioral task
behavioral1
Sample
023198403d56a0b5b6a3c577143379754688b84636c89bce87f3897aa6a4cad4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
023198403d56a0b5b6a3c577143379754688b84636c89bce87f3897aa6a4cad4.exe
Resource
win10v2004-20220901-en
General
-
Target
023198403d56a0b5b6a3c577143379754688b84636c89bce87f3897aa6a4cad4
-
Size
240KB
-
MD5
653cd11d52db90648ad8ac21139e1640
-
SHA1
a84b8549bd291e5a1cca6376eee5cd7ccf1a1715
-
SHA256
023198403d56a0b5b6a3c577143379754688b84636c89bce87f3897aa6a4cad4
-
SHA512
4fc66e2ddc45bca642256a7e7613de9ab211305a9d5fa53f2b5d10220aacb56ce0904804c64e73ad9c13d3cdfcbf85df7fc9c1f4b30c68a5702f74cd34069c29
-
SSDEEP
6144:mObz/AK7yDgLMT++foRRYUzQGgrcbFZx/P:mOf/AK7yDSuLzZCJ/P
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
023198403d56a0b5b6a3c577143379754688b84636c89bce87f3897aa6a4cad4.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 340KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 380KB - Virtual size: 377KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ