Behavioral task
behavioral1
Sample
debf650a9f66637551b86779366a418ec1fa78213868c2a2ae3e04d011cca785.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
debf650a9f66637551b86779366a418ec1fa78213868c2a2ae3e04d011cca785.exe
Resource
win10v2004-20220812-en
General
-
Target
debf650a9f66637551b86779366a418ec1fa78213868c2a2ae3e04d011cca785
-
Size
8KB
-
MD5
0a86886bd696a3b6fc7eb561fed6c064
-
SHA1
9cffa3390787475f245f8e200c25e021162e9742
-
SHA256
debf650a9f66637551b86779366a418ec1fa78213868c2a2ae3e04d011cca785
-
SHA512
72e6e4c35e3b81bb5d26dd437c5219ef7fc11fb46ccfb4d47ec273c071c72fa9e271f1fd836774273a55bbf9d663d18f05839536e62d4ac5e9557c760dbb042e
-
SSDEEP
96:ypW1vcz31zC8JJuVQC0/UqJPSO3jcsJLv84JDX0pZFmSHNjUDqsukbi2:bpcz4QQV5NUzcsbXOtjHUbL
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
debf650a9f66637551b86779366a418ec1fa78213868c2a2ae3e04d011cca785.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 344KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 336KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ