Behavioral task
behavioral1
Sample
19b0a561b56a5bac7265342d784e0149b0eba7978196d7dbd5367d2a47b2dbbe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
19b0a561b56a5bac7265342d784e0149b0eba7978196d7dbd5367d2a47b2dbbe.exe
Resource
win10v2004-20220812-en
General
-
Target
19b0a561b56a5bac7265342d784e0149b0eba7978196d7dbd5367d2a47b2dbbe
-
Size
704KB
-
MD5
c481b7aa5c1897f8f88f56d3c2feeac5
-
SHA1
48648247d57ce360bab25884d3cd41423ace9e0e
-
SHA256
19b0a561b56a5bac7265342d784e0149b0eba7978196d7dbd5367d2a47b2dbbe
-
SHA512
fdb06b1edd963147f21df2b74b3d6f083ef789a99153fede4b2cfbd4b2d2d137d4a525b4f8f91979c2bedae51c691d1c70fb69e75116886b60fa5bca3b9154b5
-
SSDEEP
12288:a5gBqOogwN48BoD3ZqdDBVyP99gOf6ucE3Hz2lV/7plgQq4ldueUaRW7w4wulImJ:am444oDODzy1qHOw7xq4eZw4Blx7tl
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
19b0a561b56a5bac7265342d784e0149b0eba7978196d7dbd5367d2a47b2dbbe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 724KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 508KB - Virtual size: 508KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 195KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 576KB - Virtual size: 575KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ