Behavioral task
behavioral1
Sample
dd4932cda848b124c3d00de6ee0368b31436eef42d4c2f9dff1876c6ee14e293.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd4932cda848b124c3d00de6ee0368b31436eef42d4c2f9dff1876c6ee14e293.exe
Resource
win10v2004-20221111-en
General
-
Target
dd4932cda848b124c3d00de6ee0368b31436eef42d4c2f9dff1876c6ee14e293
-
Size
4KB
-
MD5
139a4079b9d9e637b2d2c242b1d73490
-
SHA1
c7c0855d582841bfc700b11d638f329e2934a6e4
-
SHA256
dd4932cda848b124c3d00de6ee0368b31436eef42d4c2f9dff1876c6ee14e293
-
SHA512
916f2ba8ad2667e32123f7d8d8fb933d0277b0c4de72bae4fef90c79889cedef099a8a44de9ed6ffb114698540a17d0c02b30ac8b68c6eaeb9ef5f4f84a0f2e3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dd4932cda848b124c3d00de6ee0368b31436eef42d4c2f9dff1876c6ee14e293.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE