Behavioral task
behavioral1
Sample
a02b2658acab88b698af8801f7480c48ab101812801c463dfcb990af07a9db70.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a02b2658acab88b698af8801f7480c48ab101812801c463dfcb990af07a9db70.exe
Resource
win10v2004-20220812-en
General
-
Target
a02b2658acab88b698af8801f7480c48ab101812801c463dfcb990af07a9db70
-
Size
88KB
-
MD5
81cc529e8fab9a6d1fcf95116fb46b20
-
SHA1
c3db6d7cda78c14060d65698a942703ed939f3d2
-
SHA256
a02b2658acab88b698af8801f7480c48ab101812801c463dfcb990af07a9db70
-
SHA512
7f776e0e4320bfdcad985702e2431d89deccdf3aab33e72506f98cd901a686634b699d3c07237219f3e484104ce6e1bdc894d73b2df29dbab8a4b181ca5110cf
-
SSDEEP
192:r81SjNvWmmubvcWfEZAvpfhxT1gcfUZIEyfvxhsjg6JhJ66AjAEodg9J:rjNvWhuATOvnpfAtixhsU6JhJ6dAKf
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a02b2658acab88b698af8801f7480c48ab101812801c463dfcb990af07a9db70.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ