Behavioral task
behavioral1
Sample
b0a5661d090001a2853be1f862d811f4df0dacfd174c60aabd4fe6fa791a20d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0a5661d090001a2853be1f862d811f4df0dacfd174c60aabd4fe6fa791a20d1.exe
Resource
win10v2004-20220812-en
General
-
Target
b0a5661d090001a2853be1f862d811f4df0dacfd174c60aabd4fe6fa791a20d1
-
Size
49KB
-
MD5
180a8d1991c5dbbc01f883e5254fba0f
-
SHA1
71bf2bd7bda0558b1196de7a3401ac4d63db3321
-
SHA256
b0a5661d090001a2853be1f862d811f4df0dacfd174c60aabd4fe6fa791a20d1
-
SHA512
b4c6f76bdc957e1740a4bb3246815ab869597f9853e0e3fc0a470c514fb2d01e5696f93da76db8114d5e8b105daf8ffd59842bc762f99de8e6645006bd18670f
-
SSDEEP
768:31PTcopBpMltPHrGvyg/fq+eN6DPZe49Y3kBZX3jZCM1RKkP3u/:3JxBpMltPL+lJvY4+0Bt9P1RKs3u/
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b0a5661d090001a2853be1f862d811f4df0dacfd174c60aabd4fe6fa791a20d1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ