Behavioral task
behavioral1
Sample
b4bd9644012db7360e63208bcf1622b8481d057a2be7366af97a5632c3956ac1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4bd9644012db7360e63208bcf1622b8481d057a2be7366af97a5632c3956ac1.exe
Resource
win10v2004-20220901-en
General
-
Target
b4bd9644012db7360e63208bcf1622b8481d057a2be7366af97a5632c3956ac1
-
Size
231KB
-
MD5
112471687736c45eb487357c5e5eab96
-
SHA1
add0137d05891e0b8c817323cb2d5159441eeea2
-
SHA256
b4bd9644012db7360e63208bcf1622b8481d057a2be7366af97a5632c3956ac1
-
SHA512
8704ebaf5cde402e4d92e678858c616231fead4b54ee6e160f33af0885c939e94a29da3407a96295e7e32e0505b9deb7346800f4e71d4170ea148d92381d99a4
-
SSDEEP
6144:/hDkhsuXLY+3soHseajrmDKhhzaYzsYdBO6eabLNEWwBk:pAxY3oHsZjriLGdBneaJMk
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
b4bd9644012db7360e63208bcf1622b8481d057a2be7366af97a5632c3956ac1.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 308KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 222KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 365KB - Virtual size: 364KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ