Behavioral task
behavioral1
Sample
af26319e40a5e268b47e7018aa8c2916c250c24cf2f03cc1840685f6b7e01b3e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af26319e40a5e268b47e7018aa8c2916c250c24cf2f03cc1840685f6b7e01b3e.exe
Resource
win10v2004-20220812-en
General
-
Target
af26319e40a5e268b47e7018aa8c2916c250c24cf2f03cc1840685f6b7e01b3e
-
Size
30KB
-
MD5
f19b043d9c235ec6f8923df40e00ccd3
-
SHA1
d187459f1b221b81d57721a4c241b945730d12a5
-
SHA256
af26319e40a5e268b47e7018aa8c2916c250c24cf2f03cc1840685f6b7e01b3e
-
SHA512
044d179136fd3a68f0de701db880a539e1e3a6d8765f2710d6add294cbec4ca9f13ff20bfef9a94263bcbe7167c17e1137a77535889de332b6f83b37dae3dc0d
-
SSDEEP
768:peEdCY5gATuSYWyCacnGPNQEh/3oV9nLqdMp:pJ78UakGPNQEN+FOap
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
af26319e40a5e268b47e7018aa8c2916c250c24cf2f03cc1840685f6b7e01b3e.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ