Behavioral task
behavioral1
Sample
56a1cc243a306293e253d60680d0e7d4e587d13ab84a8661ab09b9652cabc158.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56a1cc243a306293e253d60680d0e7d4e587d13ab84a8661ab09b9652cabc158.exe
Resource
win10v2004-20220901-en
General
-
Target
56a1cc243a306293e253d60680d0e7d4e587d13ab84a8661ab09b9652cabc158
-
Size
5KB
-
MD5
7c8c618e54184685d34fa9247d19e370
-
SHA1
d4859ea6b5397c35231ac23ced7ebfcd01f05876
-
SHA256
56a1cc243a306293e253d60680d0e7d4e587d13ab84a8661ab09b9652cabc158
-
SHA512
e669e4cda44cc82d5c5a5d17082a95c38911d5ef7957f31f0dd109d85c5a32637a46d9c01b8843c522d2f5168470e1c06a9e103e648064fd3d671199b7f16f88
-
SSDEEP
96:Pokvl10GxW2FjJYPmVI+tTpMbCJBnp0BhVqn0U:rvl10GPdYPmVI+tTpXu7V80U
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
56a1cc243a306293e253d60680d0e7d4e587d13ab84a8661ab09b9652cabc158.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE