Behavioral task
behavioral1
Sample
fc985bc8e0502f6b7f9613badb9a452484d1075af1ed5693bf13a906e8921ca0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc985bc8e0502f6b7f9613badb9a452484d1075af1ed5693bf13a906e8921ca0.exe
Resource
win10v2004-20220812-en
General
-
Target
fc985bc8e0502f6b7f9613badb9a452484d1075af1ed5693bf13a906e8921ca0
-
Size
1.4MB
-
MD5
5c3249fcaa65ee863272d29ed4fca030
-
SHA1
3658cc90326c85ca654fb012015e5dcac4ec2c7e
-
SHA256
fc985bc8e0502f6b7f9613badb9a452484d1075af1ed5693bf13a906e8921ca0
-
SHA512
ccf27ff08869d04e6e8b881a5cee1393dc760b8b9776cdb2b31e1c4612601803c62bf649cc2811848ca8d57bd2a311df0600a8bf235ea91d0b445b84c3df520d
-
SSDEEP
24576:qTyTv4mgNCFCq2qsTdu0N92vCAAM04nxilEsgM1WWc8I1kiv6gKYR5QoCbvS47/x:qTcqbq2qsT00N92vIM0WxilEsgIhIeio
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fc985bc8e0502f6b7f9613badb9a452484d1075af1ed5693bf13a906e8921ca0.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 992KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 808KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 347KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ