Behavioral task
behavioral1
Sample
41a196b23ca7f5c2fc2ca18b5e88789568eb9ee0d910dce5c4bf6d07e4353773.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
41a196b23ca7f5c2fc2ca18b5e88789568eb9ee0d910dce5c4bf6d07e4353773.exe
Resource
win10v2004-20221111-en
General
-
Target
41a196b23ca7f5c2fc2ca18b5e88789568eb9ee0d910dce5c4bf6d07e4353773
-
Size
119KB
-
MD5
3bdaf6638632d81ef72fb47654441110
-
SHA1
aba1744a6127635c5a0acaf5a8140a61d987ae61
-
SHA256
41a196b23ca7f5c2fc2ca18b5e88789568eb9ee0d910dce5c4bf6d07e4353773
-
SHA512
6d908d52ef17a734265f9db25a16a5700b03ec7242749f811518a7e66319a1652622ef269815f7579340d3ef6158afb6dae30d37a983527308cca8f4ee649564
-
SSDEEP
1536:DaMmKEB9SeVOkNV9qpAUY539HpWwmgNkww5lx5lvLvEWgDAgvWSr+MCvAUP0I:d29xzP53PWwnzelxEA8r+M92T
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
41a196b23ca7f5c2fc2ca18b5e88789568eb9ee0d910dce5c4bf6d07e4353773.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 325B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ