Behavioral task
behavioral1
Sample
afc1547e0dfd296550fa97cc9d6aee24129aac7fc5fd6afc8f45eb4e78a1e590.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
afc1547e0dfd296550fa97cc9d6aee24129aac7fc5fd6afc8f45eb4e78a1e590.exe
Resource
win10v2004-20220812-en
General
-
Target
afc1547e0dfd296550fa97cc9d6aee24129aac7fc5fd6afc8f45eb4e78a1e590
-
Size
184KB
-
MD5
0c9dc06e9e0033677cc63e56f7e543e0
-
SHA1
c18dab4914e603752347913012660082f7fa4900
-
SHA256
afc1547e0dfd296550fa97cc9d6aee24129aac7fc5fd6afc8f45eb4e78a1e590
-
SHA512
0ab05c4efd4eb4aa9eedd42ca428ab81792554f3349c1c683e469b7f2ed70e8345acf8ab61a257b492d4fdfdeb34b32430ef5abbed202c03fae285a732a107bc
-
SSDEEP
3072:efUaDdXWWusQymdFdapGhf0RyR1qPF/njjC6tQV1xVyLZ+UJdUhKxorMdcb56tpb:e/dmWcdRhf2yR1YxY1ryLgUJqhKirEBH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
afc1547e0dfd296550fa97cc9d6aee24129aac7fc5fd6afc8f45eb4e78a1e590.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 296KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 166KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 150KB - Virtual size: 321KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ