Behavioral task
behavioral1
Sample
b326c24c313771ae62944376619a794b66a8cc3866c3dc78230170dd6ec12d13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b326c24c313771ae62944376619a794b66a8cc3866c3dc78230170dd6ec12d13.exe
Resource
win10v2004-20221111-en
General
-
Target
b326c24c313771ae62944376619a794b66a8cc3866c3dc78230170dd6ec12d13
-
Size
102KB
-
MD5
30ecdda65e1feb73d81b52eb3479ccc8
-
SHA1
a046bdb03b64dfb1acc97ef297b7ec9e7e5425b9
-
SHA256
b326c24c313771ae62944376619a794b66a8cc3866c3dc78230170dd6ec12d13
-
SHA512
2ce908aa73a93f1a7ed9090263a54600dacc3ffe817a2f9bd86e92c3001c9d482b1df5dd21ba57b52069f8dbcbdd66415876a6fb88961eb52122e3600ccebce9
-
SSDEEP
3072:rzMDrJ+tfATDLRiuW0IhGqkumUPNfjUi6kpoEOp3AJ:Pwd+tfYDFikIdmWfjUgoj3
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
b326c24c313771ae62944376619a794b66a8cc3866c3dc78230170dd6ec12d13.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ