Behavioral task
behavioral1
Sample
6facf8a89078446890265a87bf789bfaa4eab3cddbf93b69fc0fdb130c075893.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6facf8a89078446890265a87bf789bfaa4eab3cddbf93b69fc0fdb130c075893.exe
Resource
win10v2004-20221111-en
General
-
Target
6facf8a89078446890265a87bf789bfaa4eab3cddbf93b69fc0fdb130c075893
-
Size
2.8MB
-
MD5
8f474007a395da53fb383337fd409ab0
-
SHA1
526f2f1911b683b161bf0741177dbe6d20cabf0c
-
SHA256
6facf8a89078446890265a87bf789bfaa4eab3cddbf93b69fc0fdb130c075893
-
SHA512
f65849dcc201cbb67aa7c517bd9e877cb18912ddb7b97450c0a31d6576726da0be64f7449d23342823148fffeb7f7756e75709fbff1e275af1d820552d9c4344
-
SSDEEP
49152:Q2VlDHYwzlebTSMw2V3WwoZA6vNcjBruX29u7aN+O0ej499EbeKnPJqztPGxOoOi:3nDHYwxebTa2ctZA6v+1m26uD0y4maKq
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6facf8a89078446890265a87bf789bfaa4eab3cddbf93b69fc0fdb130c075893.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 640KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 436KB - Virtual size: 432KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ