Behavioral task
behavioral1
Sample
b685acfcb694b526fdf865a63a6598c0299ea85a559b907e25c5d0682c4fc36d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b685acfcb694b526fdf865a63a6598c0299ea85a559b907e25c5d0682c4fc36d.exe
Resource
win10v2004-20220901-en
General
-
Target
b685acfcb694b526fdf865a63a6598c0299ea85a559b907e25c5d0682c4fc36d
-
Size
38KB
-
MD5
890c60daee3457e04d4269a13c5fc92c
-
SHA1
d56a8b2c8138b3aae50ce49a84d96af261f7d6ba
-
SHA256
b685acfcb694b526fdf865a63a6598c0299ea85a559b907e25c5d0682c4fc36d
-
SHA512
a4e4b25f7bc7617d744704f153ea33b307a8d9ea40e6e8b08a33b6e087b0e6042cb2c729fdb90cb34045c49518fbf3c7413c8af349016dfd1566f74190f15e1b
-
SSDEEP
768:l2lI9DgRp84ytmoJYqj+8qyCcN7D25hF7mv9HyXzcPfN:l2u9sRp8PUqjmyCyH2LpW9HyXzcPfN
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b685acfcb694b526fdf865a63a6598c0299ea85a559b907e25c5d0682c4fc36d.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 419B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ