Behavioral task
behavioral1
Sample
ed6a839a3f0b88749bb9827c61bb0c724003e1626e5305cbc357ef6d91190263.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed6a839a3f0b88749bb9827c61bb0c724003e1626e5305cbc357ef6d91190263.exe
Resource
win10v2004-20221111-en
General
-
Target
ed6a839a3f0b88749bb9827c61bb0c724003e1626e5305cbc357ef6d91190263
-
Size
4KB
-
MD5
05bdc2de5d7d9b0677865f8637a6d4a0
-
SHA1
aacc01042dc51fe50652837710f31cea578557e3
-
SHA256
ed6a839a3f0b88749bb9827c61bb0c724003e1626e5305cbc357ef6d91190263
-
SHA512
04d8af849482f1c48f69e1bc2b8688d34d2ef0dea0a5c41134580f4a33186145b6743b0e181680dd740ba5f980e864dcda8aa3a6d055925873b9744c420699e9
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ed6a839a3f0b88749bb9827c61bb0c724003e1626e5305cbc357ef6d91190263.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE