Behavioral task
behavioral1
Sample
0d00c8b49e5a21750c93b252b860731a7acb292de60448ea6ecac6d3a3762a41.exe
Resource
win7-20221111-en
General
-
Target
0d00c8b49e5a21750c93b252b860731a7acb292de60448ea6ecac6d3a3762a41
-
Size
77KB
-
MD5
5105ea4b0c57fb336fa27f7ee8b134d5
-
SHA1
1fb60dcfce1d57ee848ead3c74f799d4209ba45c
-
SHA256
0d00c8b49e5a21750c93b252b860731a7acb292de60448ea6ecac6d3a3762a41
-
SHA512
ad317de24ed23b0b3db9ffc2cec4251a691f53e25e31e5f3c1558f39e0232743726bd47252d3b8ffdb91b8c3a93a84e74b6b13266c0abe0a359524b11e4fe29f
-
SSDEEP
1536:Ff1gTQ1GEBfIjlZDF/8Vh1ZbCpS7/uCuJvEC/BDZZKUdLIoSOlCK+fKACIp:Ff1P1GEBfsZDFEH19CpS72CcEC/rZld7
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
0d00c8b49e5a21750c93b252b860731a7acb292de60448ea6ecac6d3a3762a41.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE