Behavioral task
behavioral1
Sample
xp13dlq.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
xp13dlq.exe
Resource
win10v2004-20220812-en
General
-
Target
761b1a6e166fe0ece24c7d160ba006d11b316081cc823c4cc55e2b5ae05308ff
-
Size
3.2MB
-
MD5
c141771bad7a22f36957a161fe7463a0
-
SHA1
84ddfe5f3d339884c1f03d98021f30eeeecbaa8b
-
SHA256
761b1a6e166fe0ece24c7d160ba006d11b316081cc823c4cc55e2b5ae05308ff
-
SHA512
b75cba0725bde370c80d8478a1d908c4924d73dce9e735877a255dbc343ea0766d96502921db641462f4580f9d6f319173011361446fdca3b83d6a1c292aa4a0
-
SSDEEP
49152:AlWCAEcrYlBVrlBaeoH65glX8OvS6nbTmi1Fv1UqofJROZZt2w8nTc:AleEyyBtvaYqlX8O66nG4FfofJR+0Tc
Malware Config
Signatures
-
resource yara_rule static1/unpack001/xp13dlq.exe upx
Files
-
761b1a6e166fe0ece24c7d160ba006d11b316081cc823c4cc55e2b5ae05308ff.zip
-
xp13dlq.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 3.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 768KB - Virtual size: 767KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
˵.htm.html .js