Behavioral task
behavioral1
Sample
a981cc523620ffd65a69997b956afa0626b5d768b8fb09cbf0ff8999779709d6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a981cc523620ffd65a69997b956afa0626b5d768b8fb09cbf0ff8999779709d6.exe
Resource
win10v2004-20220901-en
General
-
Target
a981cc523620ffd65a69997b956afa0626b5d768b8fb09cbf0ff8999779709d6
-
Size
36KB
-
MD5
a47544174893ecc46e16331170b44a97
-
SHA1
8b7e76c121a1a17e958257e59c580b354827db93
-
SHA256
a981cc523620ffd65a69997b956afa0626b5d768b8fb09cbf0ff8999779709d6
-
SHA512
69d8c8e180f3cc535a72c2613fb2725afb3dab0713765038dc1c06c6b592b13da6710c773c0ecd59cab4fc88b2dfb3e81becbd0ff6a7982c1b4441d3e042a40b
-
SSDEEP
768:b5D6sChluO49YGK4UjWeel5hXE/m/UHVeE:b5YhVp4uWeIh0/m/UHV
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a981cc523620ffd65a69997b956afa0626b5d768b8fb09cbf0ff8999779709d6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ