Behavioral task
behavioral1
Sample
2ef6c739b7ea8ca8c59c5f887390feb22af1c78171caa90468d0817626348ecd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2ef6c739b7ea8ca8c59c5f887390feb22af1c78171caa90468d0817626348ecd.exe
Resource
win10v2004-20220812-en
General
-
Target
2ef6c739b7ea8ca8c59c5f887390feb22af1c78171caa90468d0817626348ecd
-
Size
84KB
-
MD5
879e101bc914ffa46d8aea74777ed57a
-
SHA1
1660286c4aca6abc53be34a9764509fe9e21b447
-
SHA256
2ef6c739b7ea8ca8c59c5f887390feb22af1c78171caa90468d0817626348ecd
-
SHA512
97ed91244921fbbddeafc8757b6f8ed2fb80de07ff3f166f838106586b8aa8c6b96d547520c7f8a1277aae882c4f26790095b2c3ff2126d87394d391101a488f
-
SSDEEP
1536:mPUg3lR8iT9XUJi6NhqKV2oCTGKuX5lYxjAJgO4djPgdNRuEOR2nI/0PiZ:m33lR8Q9kJNNh34TC5GxjXOqoRujR2nc
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
2ef6c739b7ea8ca8c59c5f887390feb22af1c78171caa90468d0817626348ecd.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ