Behavioral task
behavioral1
Sample
4de66d1e181627c280eb71eb5da649cb728d91a7427c7380dfe71aedd1e35b81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4de66d1e181627c280eb71eb5da649cb728d91a7427c7380dfe71aedd1e35b81.exe
Resource
win10v2004-20220812-en
General
-
Target
4de66d1e181627c280eb71eb5da649cb728d91a7427c7380dfe71aedd1e35b81
-
Size
193KB
-
MD5
75fd1c3e883e457015f07535b6f6da30
-
SHA1
54cfccf503f3b0c46bacd8dc86631f010251d86b
-
SHA256
4de66d1e181627c280eb71eb5da649cb728d91a7427c7380dfe71aedd1e35b81
-
SHA512
d1e71c528e97f43e2fa08bc300e8fc5f5600cb67f448f83391e62d743fdf4ce15c9d2c4a9b476f25835980b05549eee096aef46e57c23a6dd84b52b11fff6758
-
SSDEEP
6144:WwTrZsRy+ySuEQpQmeTlyRDOQDH2vbtMpon3:WwTrWRyFfQ02vJR3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4de66d1e181627c280eb71eb5da649cb728d91a7427c7380dfe71aedd1e35b81.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rol Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE