Behavioral task
behavioral1
Sample
4a64db913e423fc63ac03e0443eeed0136caf33544ab11523a256dae409eb4c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4a64db913e423fc63ac03e0443eeed0136caf33544ab11523a256dae409eb4c4.exe
Resource
win10v2004-20220812-en
General
-
Target
4a64db913e423fc63ac03e0443eeed0136caf33544ab11523a256dae409eb4c4
-
Size
802KB
-
MD5
ffdfc2ed56b147e87d7346a2f49fb486
-
SHA1
d991e28b5385e6296feb65dd93cd2ca2cf71632e
-
SHA256
4a64db913e423fc63ac03e0443eeed0136caf33544ab11523a256dae409eb4c4
-
SHA512
930e758ff1da37766840c39a6c538df75e6e92889477eca1e78c1ce1e66f019ac6d0fefbceeecc021b9652947ae45f9ef5b61d6661ba922673ab8626f5f8b91f
-
SSDEEP
12288:gO7OB0vOB0vyCGDgtHnQeN/7YkrWBfWhvRhQUo:BOWOAADgtnQeN/7DSBfWho
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4a64db913e423fc63ac03e0443eeed0136caf33544ab11523a256dae409eb4c4.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ