General
-
Target
xunyou.exe
-
Size
114KB
-
MD5
c8c27deedecc49233da0f2e4d73998d6
-
SHA1
ce558b3a50263e603ff2cc03bb2c26a43e4cd835
-
SHA256
de47e773f250b1afae185695e1568a0631ca1235e8eae28fbeec4d50167069bc
-
SHA512
ca68763efe01083704c2e18e4aaac6921b379564db3d5f7b158274019529196db72b38259b7a82ca3b523b022bcc70c55b7eeb25e3fd06d86af81fb4da07dd10
-
SSDEEP
3072:TmMAXVCqLRv932vbhVjiG55EGHNwhBzbIe6sout:EVCqdv93Y3GhBXksoS
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
xunyou.exe.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 396KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 113KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE