Behavioral task
behavioral1
Sample
eb26978d9a7e4df63bb1706a0a539da4f90cb31aa2682a5f53df58539f2fdb01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb26978d9a7e4df63bb1706a0a539da4f90cb31aa2682a5f53df58539f2fdb01.exe
Resource
win10v2004-20220812-en
General
-
Target
eb26978d9a7e4df63bb1706a0a539da4f90cb31aa2682a5f53df58539f2fdb01
-
Size
4KB
-
MD5
8181a95456fd10a7b665f78f851d86b0
-
SHA1
0f37fff18e0a9606bf64a23cdbe69a2fde5c3e1b
-
SHA256
eb26978d9a7e4df63bb1706a0a539da4f90cb31aa2682a5f53df58539f2fdb01
-
SHA512
17ca03f2c819b0be3567dcf42eee1133080987ad6e2147143c6fc414479471e0a42f409f42c8590e058f377df4699895b549db0be2bb6574c7f41fa987202b78
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
eb26978d9a7e4df63bb1706a0a539da4f90cb31aa2682a5f53df58539f2fdb01.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE