Behavioral task
behavioral1
Sample
64e0c746a9db3eb36a00f6f5a99c1c43cd6d4ee64175dcc1d4b79d73b90f3335.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64e0c746a9db3eb36a00f6f5a99c1c43cd6d4ee64175dcc1d4b79d73b90f3335.exe
Resource
win10v2004-20220812-en
General
-
Target
64e0c746a9db3eb36a00f6f5a99c1c43cd6d4ee64175dcc1d4b79d73b90f3335
-
Size
4KB
-
MD5
39710efe41beadbe777a89a170612830
-
SHA1
0907a1750c0f58a6d954d9c171a86d666da0299a
-
SHA256
64e0c746a9db3eb36a00f6f5a99c1c43cd6d4ee64175dcc1d4b79d73b90f3335
-
SHA512
93cc16e77392cfab7dd811f22e11e372e44d63c42499ebd4b7950f282ee361bd807e29bffe70e7f91ff1ea8be710c06f88c51fddbaa548cce51d3243123015ae
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
64e0c746a9db3eb36a00f6f5a99c1c43cd6d4ee64175dcc1d4b79d73b90f3335.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE