Behavioral task
behavioral1
Sample
d204f39d6124c0516d7b078117ab3e974c9348d5d720e38e068f354edf94a73c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d204f39d6124c0516d7b078117ab3e974c9348d5d720e38e068f354edf94a73c.exe
Resource
win10v2004-20220812-en
General
-
Target
d204f39d6124c0516d7b078117ab3e974c9348d5d720e38e068f354edf94a73c
-
Size
93KB
-
MD5
702dc50732aa0bb46690c6169a4925e0
-
SHA1
8ef659786c6eee428a8136c83d2f3a99211e28da
-
SHA256
d204f39d6124c0516d7b078117ab3e974c9348d5d720e38e068f354edf94a73c
-
SHA512
db7416a66d5812c556a587d841e981b8f8b459c58932d05d7f0c44a31796457a2e3e90d3762cd49f9c16332482d7418229e12c3ac717d0d6c39fb387e8b3f68b
-
SSDEEP
1536:7ciNuVFfd+rwNqA0lSyEVr1aFF7kzedcnHXYOBHcTV2yCIrZoLSai03i15owmy6z:hNuVFWwKf61Kdme2n3YKHvINoLhplzfD
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d204f39d6124c0516d7b078117ab3e974c9348d5d720e38e068f354edf94a73c.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ