Behavioral task
behavioral1
Sample
4989f252c32c41793f70c07f2ad9061a046ac460d833871e489590b249fe18c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4989f252c32c41793f70c07f2ad9061a046ac460d833871e489590b249fe18c1.exe
Resource
win10v2004-20220812-en
General
-
Target
4989f252c32c41793f70c07f2ad9061a046ac460d833871e489590b249fe18c1
-
Size
1.3MB
-
MD5
193416a0b880ff925bbb6417ba429558
-
SHA1
23575f155a0761dc8fc227eb64f60ea54042a0a2
-
SHA256
4989f252c32c41793f70c07f2ad9061a046ac460d833871e489590b249fe18c1
-
SHA512
96fc1f257ad139dd09673d6e36df2ad539ab6c29d8680746718572cf59ff386e65427ca28acdb8f63dc370e6daf2b54dbe1d1f7a25b00d0b79134c916322c830
-
SSDEEP
24576:PH4Tb8LtGI3M5FSriO9aSN6HUai7G+5z+O5j96/bKjk77LGYVvwblFeQ15tWpqhp:ATbot33Mz+iOQSN6HUaMG+h+wj9ubKjB
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4989f252c32c41793f70c07f2ad9061a046ac460d833871e489590b249fe18c1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 520KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 468KB - Virtual size: 466KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 996KB - Virtual size: 994KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 355KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ