Behavioral task
behavioral1
Sample
fda557cb3112aaec2915b92f1681c77efa7dc867a8d563923ec582180fb2c0fd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fda557cb3112aaec2915b92f1681c77efa7dc867a8d563923ec582180fb2c0fd.exe
Resource
win10v2004-20221111-en
General
-
Target
fda557cb3112aaec2915b92f1681c77efa7dc867a8d563923ec582180fb2c0fd
-
Size
24KB
-
MD5
783ae003930d623ba152c36908c3ed4c
-
SHA1
794bf2e2ad915e8c9275ce8544eb4bf5f1c39986
-
SHA256
fda557cb3112aaec2915b92f1681c77efa7dc867a8d563923ec582180fb2c0fd
-
SHA512
c517ac6402ed211bca92c2f939241f12e25abb84bd31eaf81135ec2fc4876ffd3abbeb73ccb0ea086d140bd68a898df989435e8c442a08a00530ff0ebba1033c
-
SSDEEP
384:6r0CRiBoKU+eXC/UERMfbdiYKBj1FplXA59/IUT8ptyqn1GB1WIdMjuWgATO:GdAeSxMfbdw1PlXO9wUT8ptyw1G1dMj7
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fda557cb3112aaec2915b92f1681c77efa7dc867a8d563923ec582180fb2c0fd.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.data Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ