Behavioral task
behavioral1
Sample
b11a8266cbb406a001d57b5462288ec021d6260b01f27fa685651878b5f66407.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b11a8266cbb406a001d57b5462288ec021d6260b01f27fa685651878b5f66407.exe
Resource
win10v2004-20220901-en
General
-
Target
b11a8266cbb406a001d57b5462288ec021d6260b01f27fa685651878b5f66407
-
Size
5KB
-
MD5
91537100546d40c828831c695ef06730
-
SHA1
68d2d67804d64513518dbb92e089e8cd22ea30a7
-
SHA256
b11a8266cbb406a001d57b5462288ec021d6260b01f27fa685651878b5f66407
-
SHA512
cdafdf4fb1a1edab82a3a67dce1a3b8745eafb7b040ee5ef73a829a5a4aefea5459dc448f09806e519ab0ea70a5d6c9da7e2f4f35717978d09912d1b533a0695
-
SSDEEP
96:Avl10GxW2FjJYPmVI+tTpMbCJBnXgFq3cx1U0zqukU:Avl10GPdYPmVI+tTpXXXcEukU
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b11a8266cbb406a001d57b5462288ec021d6260b01f27fa685651878b5f66407.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE