Behavioral task
behavioral1
Sample
00c89a30b01742fcc3648756f82de2216e3fcb4cbc554dc4e954c90e9099aac3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00c89a30b01742fcc3648756f82de2216e3fcb4cbc554dc4e954c90e9099aac3.exe
Resource
win10v2004-20220812-en
General
-
Target
00c89a30b01742fcc3648756f82de2216e3fcb4cbc554dc4e954c90e9099aac3
-
Size
128KB
-
MD5
a232f5e84994a09683c931fec48f8940
-
SHA1
b07ccc4833da83c978d2dc2fb3f2ac1b444224f3
-
SHA256
00c89a30b01742fcc3648756f82de2216e3fcb4cbc554dc4e954c90e9099aac3
-
SHA512
bd67ecc150e0b31b2ed7fef68dca4e596704ba2e3ae9f2116c0cf4aeca49f3df30f8b4ea30bd4c4b7d8ff9935975e5db902e78abd042d40287f68f680a6fd716
-
SSDEEP
1536:Bjps9qWF+OFLqpdKSkrBrxB7GUjhOgiu42tAnnMj26gRVvVmFk5cnaX4:NpYq2BOpdJkrHByUjho2Wnv6gfgFkRX4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
00c89a30b01742fcc3648756f82de2216e3fcb4cbc554dc4e954c90e9099aac3.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 188KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 61KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 487B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ