Behavioral task
behavioral1
Sample
d17943bdfc8d5cf355caf1a12eb7b5496ac193262a07dea3decb28394380df45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d17943bdfc8d5cf355caf1a12eb7b5496ac193262a07dea3decb28394380df45.exe
Resource
win10v2004-20221111-en
General
-
Target
d17943bdfc8d5cf355caf1a12eb7b5496ac193262a07dea3decb28394380df45
-
Size
431KB
-
MD5
4ab0b7fde70c04fd6bf2b33b72e1941c
-
SHA1
456efc09891e211c3fc5b27fbda16723b9ce991c
-
SHA256
d17943bdfc8d5cf355caf1a12eb7b5496ac193262a07dea3decb28394380df45
-
SHA512
5f7b52877f8b13c67fbb49fa9f4e33d0cb47b04d6d221ec938250942129084dd4b33eb472162e965918f4cc7a0ecfda67e8c8b57222031adeb3a762778d5648b
-
SSDEEP
12288:2wCavqRnzcXob2IiTUMDH59hu4MSXP8tLv5Q:FvqNWobAT7DZsSf8tl
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d17943bdfc8d5cf355caf1a12eb7b5496ac193262a07dea3decb28394380df45.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 429KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 320KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ