Behavioral task
behavioral1
Sample
b569659106dd06c00282592f388b1165b35fa7e2f02127db79f255e4a1ee95f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b569659106dd06c00282592f388b1165b35fa7e2f02127db79f255e4a1ee95f3.exe
Resource
win10v2004-20221111-en
General
-
Target
b569659106dd06c00282592f388b1165b35fa7e2f02127db79f255e4a1ee95f3
-
Size
4KB
-
MD5
136fc071108c92c742cc09891d29bfb0
-
SHA1
e0bfa3d2d39926512845d670994f721f3f608d95
-
SHA256
b569659106dd06c00282592f388b1165b35fa7e2f02127db79f255e4a1ee95f3
-
SHA512
4d6023652ab9cc803423c608c8a73377b339820d7f4efa604c3beadf56671e4f5a30c780c666f4b584216c9ee24ec40d6e7353640beb3c07ef6278dfa0eebad4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b569659106dd06c00282592f388b1165b35fa7e2f02127db79f255e4a1ee95f3.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE