Behavioral task
behavioral1
Sample
fac939f56be1cf4771ac5d0e484bf67abd40735d764d1f660fcad149442f48e2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fac939f56be1cf4771ac5d0e484bf67abd40735d764d1f660fcad149442f48e2.exe
Resource
win10v2004-20220901-en
General
-
Target
fac939f56be1cf4771ac5d0e484bf67abd40735d764d1f660fcad149442f48e2
-
Size
134KB
-
MD5
1e78ff44e3b993bc05d4edb12ece529c
-
SHA1
29ddde8a55ca251b4ba10a189c004c8626198dc6
-
SHA256
fac939f56be1cf4771ac5d0e484bf67abd40735d764d1f660fcad149442f48e2
-
SHA512
1315be1ff85dd255324a4425980d9d22de787878d6595acb7d96cf69605abd1565db891651515f4b34c70bb9fea003a6bf1f554d690ae8ba17218ad2feedf7d7
-
SSDEEP
3072:euroQz0ghHuJnJw+D0O4gs4uA5P1XfuHhsmbXS/e68w8:NocDOJy+Drxz3x1vutbiP4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fac939f56be1cf4771ac5d0e484bf67abd40735d764d1f660fcad149442f48e2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 312KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 132KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 64KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 187KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE