Behavioral task
behavioral1
Sample
9c6eb747efe10e2bd23437b26dfd7657ca34bb49e23ac52d4805c5e7347dcc63.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c6eb747efe10e2bd23437b26dfd7657ca34bb49e23ac52d4805c5e7347dcc63.exe
Resource
win10v2004-20221111-en
General
-
Target
9c6eb747efe10e2bd23437b26dfd7657ca34bb49e23ac52d4805c5e7347dcc63
-
Size
92KB
-
MD5
793e07029538564a1e78f330e544b2d0
-
SHA1
6d0b87f3ae17d5982be6e67f6fa50b24c9972e63
-
SHA256
9c6eb747efe10e2bd23437b26dfd7657ca34bb49e23ac52d4805c5e7347dcc63
-
SHA512
771ed3cb702cc3eb5fd7c5e6f4dedf7a872836989a6680316c46f6cda4143a6dce6cdc94f559acfaa2bf7ebdec195713e3b3430ec7939f969f3c8a23c46011f2
-
SSDEEP
1536:0oKrToNSVh0QSLJlEaVaR9CCavU+36deTo2q6efayXV06lizD0R6qArLNGsz+/Bg:VpNyRgVVaR9C0dao2njyuOoxqk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9c6eb747efe10e2bd23437b26dfd7657ca34bb49e23ac52d4805c5e7347dcc63.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 100KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ