Behavioral task
behavioral1
Sample
883bf0df9817133139f8744e7cb6ef6cb042d0bf9f681e70a0a4389e81262f56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
883bf0df9817133139f8744e7cb6ef6cb042d0bf9f681e70a0a4389e81262f56.exe
Resource
win10v2004-20221111-en
General
-
Target
883bf0df9817133139f8744e7cb6ef6cb042d0bf9f681e70a0a4389e81262f56
-
Size
114KB
-
MD5
cb73c1487a64ab5d91423baee32600b5
-
SHA1
4ea38d9bdb84dadc91f0dab21a272ccd1431baac
-
SHA256
883bf0df9817133139f8744e7cb6ef6cb042d0bf9f681e70a0a4389e81262f56
-
SHA512
a45b687f371436aae3de6651bbcb178e49e1cbfdc89a8a873b4967c70f52f0592db10d8daf5894e0e42de96a496a94fd437b87c89aae9394e3b5c1c5a3b8383d
-
SSDEEP
3072:AXuuz6JQUjDmoCLBpSGef6AgaJfXFUvSfg+d:AXp62UPo8SAgaJ9aSfgk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
883bf0df9817133139f8744e7cb6ef6cb042d0bf9f681e70a0a4389e81262f56.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ