Behavioral task
behavioral1
Sample
a8f3a053e1f692f5cfc5196801a56a33f9dc13fe7d954ea2f220f1968046c262.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8f3a053e1f692f5cfc5196801a56a33f9dc13fe7d954ea2f220f1968046c262.exe
Resource
win10v2004-20220812-en
General
-
Target
a8f3a053e1f692f5cfc5196801a56a33f9dc13fe7d954ea2f220f1968046c262
-
Size
369KB
-
MD5
0b4d192d381c6b48136e30bdd044b829
-
SHA1
55c27e6b593c9d2134b4a62354e2e70b92475f48
-
SHA256
a8f3a053e1f692f5cfc5196801a56a33f9dc13fe7d954ea2f220f1968046c262
-
SHA512
30e6cd8c558d98909d8f062feade4e88a773b4070de411305d4113cfc24b9c30ae4b56b67271e73d8a0ff42e4caa35ab28ac4beea0408731c9045e2117113a91
-
SSDEEP
6144:CeI84ZZz3FvSH5GXOnhFUJen5MsbDkihWHwK5Yg895cl1PMe0ZkG9SLlZDbu3Vad:C+4poSwGsbD5U895cbPMwmGnuU219D
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a8f3a053e1f692f5cfc5196801a56a33f9dc13fe7d954ea2f220f1968046c262.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 365KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 326KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ