Behavioral task
behavioral1
Sample
5850c095e20b57e7e21cb9bc4ec2ff66f19f0a9bab0cde12bdbbfb704a8fcc45.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5850c095e20b57e7e21cb9bc4ec2ff66f19f0a9bab0cde12bdbbfb704a8fcc45.exe
Resource
win10v2004-20220812-en
General
-
Target
5850c095e20b57e7e21cb9bc4ec2ff66f19f0a9bab0cde12bdbbfb704a8fcc45
-
Size
23KB
-
MD5
41f3e03884044155f8298e287027f69e
-
SHA1
426dc79073b9052246ce3cc06083d242f5df5393
-
SHA256
5850c095e20b57e7e21cb9bc4ec2ff66f19f0a9bab0cde12bdbbfb704a8fcc45
-
SHA512
2b6f8b0576f307e7c802f6e5a4a99661be421b2172c5235f927b8c293f3377a0124536804fd12e84975d672a5dac080f11563f971f0c476eb80f2bcdde222e91
-
SSDEEP
384:u5kJtp3gnM+iIdD/n/JAqiH7wl6FHbLt1IyHbwJ7B2P576IUCt3YUXnvbWS29aWk:T3uM8/nccObRzHW7BkUG3N3vW9DE
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
5850c095e20b57e7e21cb9bc4ec2ff66f19f0a9bab0cde12bdbbfb704a8fcc45.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ