Behavioral task
behavioral1
Sample
d5d4790090d55f99d87c5ac9ad925bc8a46834424ef9994c4bffcd1b0f035d1e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d5d4790090d55f99d87c5ac9ad925bc8a46834424ef9994c4bffcd1b0f035d1e.exe
Resource
win10v2004-20220901-en
General
-
Target
d5d4790090d55f99d87c5ac9ad925bc8a46834424ef9994c4bffcd1b0f035d1e
-
Size
44KB
-
MD5
a234925348a48a3203de1cd718ad7d90
-
SHA1
40586e24e652f00e2ae0e7912c8bfa385839835d
-
SHA256
d5d4790090d55f99d87c5ac9ad925bc8a46834424ef9994c4bffcd1b0f035d1e
-
SHA512
2b3b288e71caf11e571ca0eb8a8cc020d2241e9fa78107b8eefe0b1e411bca04a890c64dfb02300f32edb81e2fa573ce0352c584f3cf3840990eb63451feaeae
-
SSDEEP
768:EckrgwXXiXB9GAH8nOJ7S2kjHjb88LmMjThIBt9ir6rpfrQCpR+qOT:EP3niR9GKvIbxmMjFIB46rBrQCKqOT
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d5d4790090d55f99d87c5ac9ad925bc8a46834424ef9994c4bffcd1b0f035d1e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 188KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ