Behavioral task
behavioral1
Sample
bb50dbe6f9b53b3c15aa1401240678031f616b6d8452197f3e13e549eb06f888.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb50dbe6f9b53b3c15aa1401240678031f616b6d8452197f3e13e549eb06f888.exe
Resource
win10v2004-20221111-en
General
-
Target
bb50dbe6f9b53b3c15aa1401240678031f616b6d8452197f3e13e549eb06f888
-
Size
132KB
-
MD5
555432501eaf716b6aedde4805b885e8
-
SHA1
0b37c7d57ea5a812674dd8e1db5f68e2f8cedb91
-
SHA256
bb50dbe6f9b53b3c15aa1401240678031f616b6d8452197f3e13e549eb06f888
-
SHA512
e9e6d8883516409f5f896159070e7beda24ff1b500ab2acc8eb4805fa62b01b615db9dc6f48f82a007f658f475a75404c55512645779283bac5fa2e506bc52e9
-
SSDEEP
3072:x/rcM6Y2MGMW37YmjTQy3p0U4sXmGTwMnRN44gtwcrDQVFT+uCB:drcMr9Gx3sNEZ4dGTZT4TmODQVFSuk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bb50dbe6f9b53b3c15aa1401240678031f616b6d8452197f3e13e549eb06f888.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 184KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 130KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 43KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 110KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE