Behavioral task
behavioral1
Sample
f8800ec9fcdb07ddeab007abfc8f461445ba8417c3c61079275cdca9ae6daf52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f8800ec9fcdb07ddeab007abfc8f461445ba8417c3c61079275cdca9ae6daf52.exe
Resource
win10v2004-20220812-en
General
-
Target
f8800ec9fcdb07ddeab007abfc8f461445ba8417c3c61079275cdca9ae6daf52
-
Size
372KB
-
MD5
69e53446a70c7f6bf122849982697306
-
SHA1
22bf110ae2e4761399f4f329ac12c5ded1235a48
-
SHA256
f8800ec9fcdb07ddeab007abfc8f461445ba8417c3c61079275cdca9ae6daf52
-
SHA512
123fab2884a4166247bd470aa977e0e8a7436d382cd300b88c8ea6fcaa02020a72403ab16bf175964a89643026aadb0584a5e3a764744fadeacfff5c965dd3f5
-
SSDEEP
6144:5cab4w/UQp6PAXYCvYUGM0I0qKjHjdO3iVs/hBJ5vTIU7nLjX9VMdFDz6coGRSKi:qQd6FcG0C7jIiVsnJ5vsI9udF/T
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f8800ec9fcdb07ddeab007abfc8f461445ba8417c3c61079275cdca9ae6daf52.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 468KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 366KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 456KB - Virtual size: 455KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ