Behavioral task
behavioral1
Sample
fd0cb2ae00487ed8d483740ca670e491435d6c715d7531440b0c611f21973600.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd0cb2ae00487ed8d483740ca670e491435d6c715d7531440b0c611f21973600.exe
Resource
win10v2004-20220812-en
General
-
Target
fd0cb2ae00487ed8d483740ca670e491435d6c715d7531440b0c611f21973600
-
Size
5KB
-
MD5
04f4a7c9f410ae0950ff86c2c8b212b0
-
SHA1
1206c89487f12f7a451885b57aeeaf344a19a6e0
-
SHA256
fd0cb2ae00487ed8d483740ca670e491435d6c715d7531440b0c611f21973600
-
SHA512
59b3672ba5373ea9e60be97478593e8c42619bb47b89c8f1bd648d3cf214dcca9b8c81bbd7056f7450a870b9083a678000309085dd9c07ffdc7693917b9c81bf
-
SSDEEP
96:Hvl10GxW2FjJYPmVI+tTpMbCJBnXgFq3cx1U0zqukU:Hvl10GPdYPmVI+tTpXXXcEukU
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fd0cb2ae00487ed8d483740ca670e491435d6c715d7531440b0c611f21973600.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE