Behavioral task
behavioral1
Sample
dfd358b2fd6c116d9abb0cf276c8404ec3448dc243f9c7204b542353a222d673.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dfd358b2fd6c116d9abb0cf276c8404ec3448dc243f9c7204b542353a222d673.exe
Resource
win10v2004-20220812-en
General
-
Target
dfd358b2fd6c116d9abb0cf276c8404ec3448dc243f9c7204b542353a222d673
-
Size
214KB
-
MD5
5dfaea6de5e1f0b3b7bf0ed4efb797dc
-
SHA1
0cb347e54531fe9e65a598870b25eedf574b9f80
-
SHA256
dfd358b2fd6c116d9abb0cf276c8404ec3448dc243f9c7204b542353a222d673
-
SHA512
c19b2222201da12f31b160ec8701e08b9597c68f8454def3f8acb92de2ad79e441a5745e48396bd19985ce21fc006d20a222825e111ea360cfeab67b41ae553d
-
SSDEEP
6144:iiic5erFWDqy9RzSGK1eQY3nok1nV5QJscpl1zlsRgLt:1x5iWOQRzSG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dfd358b2fd6c116d9abb0cf276c8404ec3448dc243f9c7204b542353a222d673.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE