Behavioral task
behavioral1
Sample
a4d2ad07efd496a65e8db0c4ccd66acc8488ec7e63d5c1acbb0c97041ee41c29.exe
Resource
win7-20220812-en
General
-
Target
a4d2ad07efd496a65e8db0c4ccd66acc8488ec7e63d5c1acbb0c97041ee41c29
-
Size
126KB
-
MD5
0b00491d2c4256dd6ae199163ed8a640
-
SHA1
2d5f2617d728b4102e507b8daccc5d92c5ab4240
-
SHA256
a4d2ad07efd496a65e8db0c4ccd66acc8488ec7e63d5c1acbb0c97041ee41c29
-
SHA512
31d36365d7eab7d8d4d0bc182ebbdc3f2fe3712c8eba8a8a89fbb188723395f31e584b1c15e70a04757faa1f2818dc1ff3b00e274918e55a2aa20f5161e1ad5b
-
SSDEEP
1536:shivqRTLZQVgiVQXmxFsEtE1vvhCV6wOyupngcg5rmH8tz2+793PQsqFKMbUANZE:Mkie2Otg1vvAVxcDVsfRq3w/vYMf5WVE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a4d2ad07efd496a65e8db0c4ccd66acc8488ec7e63d5c1acbb0c97041ee41c29.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ