Behavioral task
behavioral1
Sample
d99b132c405c482fcf43461ca9a4e1da5b7d3be21bc9fcd609e8261d36fd729d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d99b132c405c482fcf43461ca9a4e1da5b7d3be21bc9fcd609e8261d36fd729d.exe
Resource
win10v2004-20220812-en
General
-
Target
d99b132c405c482fcf43461ca9a4e1da5b7d3be21bc9fcd609e8261d36fd729d
-
Size
26KB
-
MD5
ad81119af13c9e2f6ec54f6b7087a451
-
SHA1
493792be3f99f5003522ece8e8d79f74a18fc601
-
SHA256
d99b132c405c482fcf43461ca9a4e1da5b7d3be21bc9fcd609e8261d36fd729d
-
SHA512
93d43b367d4c5254a370957bfb7f48428e6166330e2a075d6348bab21270292897b403cf7edbcf8a1191bfaf176a184f1e45afbff7fe06bba9a70d33cf878d36
-
SSDEEP
384:qdYCMG4nYUEaeH9lKv6wEPjxoW8mfHWb/Lhx0AkDRS+vI9xgrr1FLUOADu+G3e:IMPnYU4k6w2jxoWCbFMvIv6rLUOADu+1
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d99b132c405c482fcf43461ca9a4e1da5b7d3be21bc9fcd609e8261d36fd729d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ