Behavioral task
behavioral1
Sample
87eb80686dbca0134067022107574a618d77b576668c56d20ade2b3ebe539e5a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87eb80686dbca0134067022107574a618d77b576668c56d20ade2b3ebe539e5a.exe
Resource
win10v2004-20221111-en
General
-
Target
87eb80686dbca0134067022107574a618d77b576668c56d20ade2b3ebe539e5a
-
Size
16KB
-
MD5
09c31271ec4a5e1f51a15bd587339bb0
-
SHA1
9dd6b9a24342b746884fa99c085ba3edac6dca1d
-
SHA256
87eb80686dbca0134067022107574a618d77b576668c56d20ade2b3ebe539e5a
-
SHA512
d0f2dfcc011e1c38981f798c64a8405fa3a775a6ac3089906a5fcf84d16c25d1ccbc5ffaa383a1f4ab173f6c44259b671779e01834d6d2d3ecdb8b9c660ffd99
-
SSDEEP
192:z1KAAGKRWgCdT3QbBfIQGptILWn1kKagOKgBMxlgJrcSt9NL5moMJNvNJtP9BaT:oHPh4MbsptIL2fagOngKJQakoM30T
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
87eb80686dbca0134067022107574a618d77b576668c56d20ade2b3ebe539e5a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE