Behavioral task
behavioral1
Sample
2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e.exe
Resource
win10v2004-20220812-en
General
-
Target
2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e
-
Size
4.9MB
-
MD5
b6d23a61b6d8d2d884b7a0b8c1146d35
-
SHA1
1940e67af2b596652c0b025ea01af732e6b784b0
-
SHA256
2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e
-
SHA512
b03990b5fb8349fc238f6ca5b5f6e10dbfba20553ef9abc1c9a91d1fcaa0405bc8ccae653fc6d6e2ce9a14d886164566522390c10e7bb98b1cced208caf6d90b
-
SSDEEP
98304:zJOtkkrLQhWEgwbamycpSInRbK6wbfTleUoTJmMGp0ZqCbtfAmnnliOeNW0cAUez:NckkrLcWEgQZfRbK60QJnT7nsO8DHG9
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
2c78b9c1a80bfd76e5afca72d09e9a0459db2b75955363fc7a65ef24dc22819e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 9.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11.8MB - Virtual size: 11.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ