Behavioral task
behavioral1
Sample
86943d0f49c365b5a1403ee14231ea5a93a09a1d8b8cbe3fee1d327d3ebb23d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86943d0f49c365b5a1403ee14231ea5a93a09a1d8b8cbe3fee1d327d3ebb23d9.exe
Resource
win10v2004-20221111-en
General
-
Target
86943d0f49c365b5a1403ee14231ea5a93a09a1d8b8cbe3fee1d327d3ebb23d9
-
Size
89KB
-
MD5
7d4f0f7f9c80c5286d13c7384ff5e8b8
-
SHA1
385c9f374bbc679b9a190dbbb9d249965b962e8f
-
SHA256
86943d0f49c365b5a1403ee14231ea5a93a09a1d8b8cbe3fee1d327d3ebb23d9
-
SHA512
1662c41fbb7a0da0bf8291f159810a31c37aa1b2c91bf362f2d9ad9d7acbb8133e2439fb6244ec43f1302c106e77403467ed445e343fd977d877c7064129b4de
-
SSDEEP
1536:5Uzjx2hftMNooAocoTILylBqMcxfIp9MVb0KK0soNKVSLQ2t6prallygBpdoEL8J:FftMNFAocoMLyLqxtKe5K+KVSLQ9U7yV
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
86943d0f49c365b5a1403ee14231ea5a93a09a1d8b8cbe3fee1d327d3ebb23d9.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 168KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE