Behavioral task
behavioral1
Sample
1d9c0d3033756b5ae9a21512554df759f75b5bcba036e09c7915e7abf6c4d4bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d9c0d3033756b5ae9a21512554df759f75b5bcba036e09c7915e7abf6c4d4bb.exe
Resource
win10v2004-20220812-en
General
-
Target
1d9c0d3033756b5ae9a21512554df759f75b5bcba036e09c7915e7abf6c4d4bb
-
Size
4KB
-
MD5
48fc59a7294f959ad52f1db57d7f6040
-
SHA1
3a207578259090a58965a718191a71075ca01f2c
-
SHA256
1d9c0d3033756b5ae9a21512554df759f75b5bcba036e09c7915e7abf6c4d4bb
-
SHA512
25af04f24ba29ed69c4b3d65e580d9987658b573fa2f0f871d93c02d5952f234564f588cf6304e0128bbc33ac04880020e991390aea417c23f958c7d646c115c
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1d9c0d3033756b5ae9a21512554df759f75b5bcba036e09c7915e7abf6c4d4bb.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE