time
Behavioral task
behavioral1
Sample
888bb14c38f8d26007132ddc84ae2dd8b724d148f4d48a482517413d81baf60b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
888bb14c38f8d26007132ddc84ae2dd8b724d148f4d48a482517413d81baf60b.exe
Resource
win10v2004-20220901-en
General
-
Target
888bb14c38f8d26007132ddc84ae2dd8b724d148f4d48a482517413d81baf60b
-
Size
23KB
-
MD5
9b6e748f71ecd3d2c893e05499d58478
-
SHA1
344cfa54935e74572748302da8d2d50d594ea7bd
-
SHA256
888bb14c38f8d26007132ddc84ae2dd8b724d148f4d48a482517413d81baf60b
-
SHA512
f1ac489eb45cdee8f0f616f7f3ee36b7b508c7fac667caad1e7f71c7a32961ee6e7e904c46182ee0c02e78b537f3361889209f351e634957c5a6e4e59c1a4b1d
-
SSDEEP
384:JYJE7MPVdf96PYs3dlnMtrafFY09qhyq/u3ACohuHl2HdSTRuGIZYQ4A:JR4BuDlTdYAq23DohE+09dIZYt
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
888bb14c38f8d26007132ddc84ae2dd8b724d148f4d48a482517413d81baf60b.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE