Behavioral task
behavioral1
Sample
c2df89df206799c2113130781cae3195faf589185626470773226f4bcc734a6b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2df89df206799c2113130781cae3195faf589185626470773226f4bcc734a6b.exe
Resource
win10v2004-20221111-en
General
-
Target
c2df89df206799c2113130781cae3195faf589185626470773226f4bcc734a6b
-
Size
196KB
-
MD5
c33bbaefdd1ae6d27d05d522557970d1
-
SHA1
59e537f8803a2cbec0199707d57c2d2cd2569a3a
-
SHA256
c2df89df206799c2113130781cae3195faf589185626470773226f4bcc734a6b
-
SHA512
9049217dcf3e711693078888cc983437598cfb260301525b300875df50c9c77c06ee56f0be8f74309c130b29e914e7bd86dae4d32cd88c8d78ba3dfbfaf78c57
-
SSDEEP
1536:/aMmKEB9SeVOkNV9qpAUY539HpWwmgNkww5lx5lvLvEWgDAgvWSrgGW8zs7q4Fyz:x29xzP53PWwnzelxEA8rgaY79
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c2df89df206799c2113130781cae3195faf589185626470773226f4bcc734a6b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 325B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ