Behavioral task
behavioral1
Sample
d4b252b0383e8d12d5c38850e029aea728c43f665074d40312a954c93c53d485.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4b252b0383e8d12d5c38850e029aea728c43f665074d40312a954c93c53d485.exe
Resource
win10v2004-20220812-en
General
-
Target
d4b252b0383e8d12d5c38850e029aea728c43f665074d40312a954c93c53d485
-
Size
89KB
-
MD5
170b82f0320e14566d52110a32ad6aec
-
SHA1
d1a63cf739e5d562cb61818bb21b1b81ffa92e64
-
SHA256
d4b252b0383e8d12d5c38850e029aea728c43f665074d40312a954c93c53d485
-
SHA512
13e87a98cce216f6cd79ae184fe1f9487d8b9c63067d1b817add2fb2ef64494f4b7c3b75b73bb3a3b1b8f309e7aaa1a70d30cb2a939ad136a684a0ea253b4b83
-
SSDEEP
1536:D/qZ1UJQFP71kmj/+1zF+jvJAU4s/SvbiOUrrX+aM/gsshHKRdT5mkkyuWUb:2Z1UUpT+zSJJ4lvbjarOaMIsslKRdTcz
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d4b252b0383e8d12d5c38850e029aea728c43f665074d40312a954c93c53d485.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 124KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 168KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE