Behavioral task
behavioral1
Sample
c86cb4a94f1ba6ffb6bb7984f2a5b2293a2f4396447c7477bd583d16ca93650a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c86cb4a94f1ba6ffb6bb7984f2a5b2293a2f4396447c7477bd583d16ca93650a.exe
Resource
win10v2004-20220901-en
General
-
Target
c86cb4a94f1ba6ffb6bb7984f2a5b2293a2f4396447c7477bd583d16ca93650a
-
Size
20KB
-
MD5
9659df5fd4461b035118be48fa3ee5d5
-
SHA1
9391739eaa8e7d6bc8c8be828f848ac23ea480d7
-
SHA256
c86cb4a94f1ba6ffb6bb7984f2a5b2293a2f4396447c7477bd583d16ca93650a
-
SHA512
f0c5b5aac7d306fe5ec79237ff7c47cd6a1d48f87a8ea71d884b46db4ba3528b78d0ef50505bb571daf9e6040fb5ffd0150b707810dc93f433f6af2f2cdfa1a3
-
SSDEEP
384:nKUpR89gTQRl4Epss/b70i3ttAapk8qYGxdnaEopIV9ZYHmh4APWic:nKi89sQRbL0i3tt97W0T+Vemh4m
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c86cb4a94f1ba6ffb6bb7984f2a5b2293a2f4396447c7477bd583d16ca93650a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ