Behavioral task
behavioral1
Sample
c60e8aedc76155d7b303d658021187b7c5c3a30a430056b4859e1618888d8583.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c60e8aedc76155d7b303d658021187b7c5c3a30a430056b4859e1618888d8583.exe
Resource
win10v2004-20221111-en
General
-
Target
c60e8aedc76155d7b303d658021187b7c5c3a30a430056b4859e1618888d8583
-
Size
211KB
-
MD5
d8da578a8050363ef37d2d0e0ab00c7b
-
SHA1
da6df4463543a703934289aafedf24b62c65c73b
-
SHA256
c60e8aedc76155d7b303d658021187b7c5c3a30a430056b4859e1618888d8583
-
SHA512
04373ff2d3e292a5bdbd4d65537e9ea9f75ed68689eed569dde3c07494863da02896cf2955f367db704aab1ae04c0ed01f9f17793106d0397483c0c7c2b90cdc
-
SSDEEP
6144:lvIgSMLwg3SxgI6MoK0zat8GzwzkIXQ/N4:lQgS0weS+IuK0qjIo4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c60e8aedc76155d7b303d658021187b7c5c3a30a430056b4859e1618888d8583.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 17.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe .js windows x86