Behavioral task
behavioral1
Sample
3bf118c9fa497a1ebb673c9f63c20368881d8c90053945cfdd96ab498d51f125.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3bf118c9fa497a1ebb673c9f63c20368881d8c90053945cfdd96ab498d51f125.exe
Resource
win10v2004-20220812-en
General
-
Target
3bf118c9fa497a1ebb673c9f63c20368881d8c90053945cfdd96ab498d51f125
-
Size
625KB
-
MD5
ee891c46a803025adfa922d645c00d85
-
SHA1
5f04766c9e71c5255a06e20dd45f1b9c84559a6b
-
SHA256
3bf118c9fa497a1ebb673c9f63c20368881d8c90053945cfdd96ab498d51f125
-
SHA512
14862a9b2f451762ce46c5dcb822e22aa7aae4335e9c8b341508ae5d8a0922e79c8742a80e943be681b93a588c7b72f1366cd26a94c24ea16f7747ad65860864
-
SSDEEP
12288:ckNxEuriRRDWRShPErHQ6VYywRwblNj3inyVua1TTYZhAEfv/sqJ:ckHEur+3hPED8ywyfW2D9Tmv/
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3bf118c9fa497a1ebb673c9f63c20368881d8c90053945cfdd96ab498d51f125.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 652KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 500KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 576KB - Virtual size: 575KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ