Behavioral task
behavioral1
Sample
cdecf9a968942486c0ff56e02081a245bed401c7b8121ccfe6cfbd824ab78440.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cdecf9a968942486c0ff56e02081a245bed401c7b8121ccfe6cfbd824ab78440.exe
Resource
win10v2004-20221111-en
General
-
Target
cdecf9a968942486c0ff56e02081a245bed401c7b8121ccfe6cfbd824ab78440
-
Size
1.2MB
-
MD5
73c08537e59273943ee7ccb63cf5c98f
-
SHA1
64ab8d6bac8c17c81f82da911b2a3f2356d61cc5
-
SHA256
cdecf9a968942486c0ff56e02081a245bed401c7b8121ccfe6cfbd824ab78440
-
SHA512
26da264b3abfc5dc17a10884d18e8981d7fc7525947de829f433553f26409252abecff6f306c24474def03f507011069d693be7d314c98f98945192a4d5d570c
-
SSDEEP
24576:feZJ8NI8DerQZb+md4wmneZJ8NI8DerQZb+md4wmwx:Q8DerQZbd2M8DerQZbd2Ux
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cdecf9a968942486c0ff56e02081a245bed401c7b8121ccfe6cfbd824ab78440.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ