Behavioral task
behavioral1
Sample
424d16323de2c303aaef76e055c2fb7ca234854cc44d6012fd3a26b4708bcdb2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
424d16323de2c303aaef76e055c2fb7ca234854cc44d6012fd3a26b4708bcdb2.exe
Resource
win10v2004-20220812-en
General
-
Target
424d16323de2c303aaef76e055c2fb7ca234854cc44d6012fd3a26b4708bcdb2
-
Size
11KB
-
MD5
611153ad9bf140c369480ebc52b7c2c0
-
SHA1
7a35456caf7fb14fb3feb89a122745c3f75bc398
-
SHA256
424d16323de2c303aaef76e055c2fb7ca234854cc44d6012fd3a26b4708bcdb2
-
SHA512
438c1429f96d31f26ae5715dfd4be54b771e5d98846d47b0c9c9815b804bcc47aae09fe4d04f2ad7e036edda330cd8904c9c5c5eacf72d5a7d4868a7983a7eac
-
SSDEEP
192:WtfbS6aVq2j8GUG2V59GZ6fs5yGGpFG8/BwnNa4wvLzfeXFGVgiHLjdu:WtTS4o8GU7VOZ3GpUMB74kLi1xinY
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
424d16323de2c303aaef76e055c2fb7ca234854cc44d6012fd3a26b4708bcdb2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 954B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE