Behavioral task
behavioral1
Sample
0de4e0538a8585c800f3de5ce413bc19ced989360707f2959a1c44bda22ad0c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0de4e0538a8585c800f3de5ce413bc19ced989360707f2959a1c44bda22ad0c7.exe
Resource
win10v2004-20220901-en
General
-
Target
0de4e0538a8585c800f3de5ce413bc19ced989360707f2959a1c44bda22ad0c7
-
Size
67KB
-
MD5
0ab723821affae9d801b42c18aac3260
-
SHA1
1a4e1cd45c3f2ce86a6dd8b26b0c0ce17a30034e
-
SHA256
0de4e0538a8585c800f3de5ce413bc19ced989360707f2959a1c44bda22ad0c7
-
SHA512
8324ed0289a2497891d2952d7aa5addead6defff50392a2f3e2bd03d913b1f16eeb989e240627556e7521a2c5fe4f0c4fd982b0bd3747c36d5799b2de581d590
-
SSDEEP
1536:qH7WQWAyrALI+70YJ7PpFF5ZRROiKkcTckkdE+ok:0Or6X7PpP/RoBkcw3dE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
0de4e0538a8585c800f3de5ce413bc19ced989360707f2959a1c44bda22ad0c7.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ