Behavioral task
behavioral1
Sample
6e9b2a7548e60634e331259dcda2b6ee2ad7aa76ba15a165a69926aedc75c633.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e9b2a7548e60634e331259dcda2b6ee2ad7aa76ba15a165a69926aedc75c633.exe
Resource
win10v2004-20220812-en
General
-
Target
6e9b2a7548e60634e331259dcda2b6ee2ad7aa76ba15a165a69926aedc75c633
-
Size
4KB
-
MD5
0f0a1c70caf34a0f988d4fbe4b0d0100
-
SHA1
2f6b6c806256b38681a1df43df38b52945e25bdb
-
SHA256
6e9b2a7548e60634e331259dcda2b6ee2ad7aa76ba15a165a69926aedc75c633
-
SHA512
683ff951a1c4009e0e730454fde1b5be32566ecbf10c4a0c428b0223f2e5e8c1ee623f00bc3f56c20e488041b2ebfd2a0a0f44d2d0bb064b65232ffd37c6473c
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6e9b2a7548e60634e331259dcda2b6ee2ad7aa76ba15a165a69926aedc75c633.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE