Behavioral task
behavioral1
Sample
e2aba790b374e52788cd4c3c4031f10db13b30be88f5ea90c6fa9637b600de59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2aba790b374e52788cd4c3c4031f10db13b30be88f5ea90c6fa9637b600de59.exe
Resource
win10v2004-20220812-en
General
-
Target
e2aba790b374e52788cd4c3c4031f10db13b30be88f5ea90c6fa9637b600de59
-
Size
693KB
-
MD5
7b3990e5032ee91378f9f764b4645977
-
SHA1
f1aa70e63d1c23de762b6f793dbb49a7fc35416c
-
SHA256
e2aba790b374e52788cd4c3c4031f10db13b30be88f5ea90c6fa9637b600de59
-
SHA512
d0272d7c77187f421b1335605a823933f2a0c95c1b6d49fc74c9c7935f4e7368a16ce45f01d2174c1f06c55682395fd40e759c33ffaff1d55b274821491f4bde
-
SSDEEP
12288:gO9ByerQZb+md4w1UArYeZJys73dOvXDpNjNe8sD:jByerQZb+md4wmAEeZJ8NI8W
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e2aba790b374e52788cd4c3c4031f10db13b30be88f5ea90c6fa9637b600de59.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ