Behavioral task
behavioral1
Sample
e1755eab1c4b2710cc304ea33727b5770de39cf265a575c0f4250ddb1594960e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e1755eab1c4b2710cc304ea33727b5770de39cf265a575c0f4250ddb1594960e.exe
Resource
win10v2004-20220901-en
General
-
Target
e1755eab1c4b2710cc304ea33727b5770de39cf265a575c0f4250ddb1594960e
-
Size
158KB
-
MD5
5a01c350dcb66ffb4b627ac59c8ce794
-
SHA1
520a17593a4c0cb8ad27a4e6c033882724d126df
-
SHA256
e1755eab1c4b2710cc304ea33727b5770de39cf265a575c0f4250ddb1594960e
-
SHA512
290beea3065af278ac92c53663b71ecf72f0c582d15ee0d224eb308e582091e1e75d2e3af1e9d952d50924183b2b8d87484f13523d4f2f3611d5d22bb82ec35e
-
SSDEEP
3072:2jvXGphAjSteGi0p+XsRf8yNqXBehq+8Qa8X0/j/PrAQfS7SAD0:kPGphAjjb0IXCfGec+w8dHzD
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
e1755eab1c4b2710cc304ea33727b5770de39cf265a575c0f4250ddb1594960e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 129KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ