Behavioral task
behavioral1
Sample
f0d228a106e4edaad2f068e83b0755b74239512ece259a2ee4e5664114f0598a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0d228a106e4edaad2f068e83b0755b74239512ece259a2ee4e5664114f0598a.dll
Resource
win10v2004-20220812-en
General
-
Target
f0d228a106e4edaad2f068e83b0755b74239512ece259a2ee4e5664114f0598a
-
Size
16KB
-
MD5
622f7fd564513ed95965b22249ef5600
-
SHA1
1a3a3674e09bfc69cae8f1855f74d6a5620293d2
-
SHA256
f0d228a106e4edaad2f068e83b0755b74239512ece259a2ee4e5664114f0598a
-
SHA512
9b41e289c4b063e3f318a8ca14b7fc7136bee3f4211ea208d9457303d8314c3f15bbbecc3f627a609cd838e0a3160a12cdd52a9842bc51579745e16a4d8957e4
-
SSDEEP
384:ndDESMeMa6fnOWTEoA6Xp72ktzh3hT8Jv:dIiMJv7T+WpyOFhAd
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f0d228a106e4edaad2f068e83b0755b74239512ece259a2ee4e5664114f0598a.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ