Behavioral task
behavioral1
Sample
37b762f14b0e905ee9080722893556344a2d2e6b97c95763ea564f13be493737.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
37b762f14b0e905ee9080722893556344a2d2e6b97c95763ea564f13be493737.dll
Resource
win10v2004-20220901-en
General
-
Target
37b762f14b0e905ee9080722893556344a2d2e6b97c95763ea564f13be493737
-
Size
16KB
-
MD5
5134cac7b6c5135564e698e5eb783815
-
SHA1
32d41bc3923641162978ce99461874998673b297
-
SHA256
37b762f14b0e905ee9080722893556344a2d2e6b97c95763ea564f13be493737
-
SHA512
3a5d8b378e9829fea589151194c4937e0f39ea37c48165870f7133157336169fcd8a9356706518526996c80199e972e2b461f1ca17c76cf8c4def10ac18353e9
-
SSDEEP
384:ndDESMeMa6fnOWTEoA6Xp72ktzh3hT87v:dIiMJv7T+WpyOFhAD
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
37b762f14b0e905ee9080722893556344a2d2e6b97c95763ea564f13be493737.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ