Behavioral task
behavioral1
Sample
86c34db5e640d95b5094a96b60adf0591ca9d26a5df3726dcd3cb412c8a9f2be.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
86c34db5e640d95b5094a96b60adf0591ca9d26a5df3726dcd3cb412c8a9f2be.exe
Resource
win10v2004-20220812-en
General
-
Target
86c34db5e640d95b5094a96b60adf0591ca9d26a5df3726dcd3cb412c8a9f2be
-
Size
53KB
-
MD5
eefd2929b07b9b43e32492a27283811f
-
SHA1
68e5c26e1524b35a7cd0c74692f0045fece3920f
-
SHA256
86c34db5e640d95b5094a96b60adf0591ca9d26a5df3726dcd3cb412c8a9f2be
-
SHA512
1e7f0e8f4d7f46e2817c7f47d75983054bcaa523cc5ac0e45bdfc4750f0f03f961417d8423ea6dc5c9b2ecb897e970a7495371f1f594b8921f1439508d6e06f6
-
SSDEEP
1536:DCaL72e/TP8XGwy/8j6mQgFNRlp/Umlzqi2NNVKCq7Mq/yR:DVL7XPxwy/i6LuNRlp8mlzqiWqB2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
86c34db5e640d95b5094a96b60adf0591ca9d26a5df3726dcd3cb412c8a9f2be.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 41KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ