Behavioral task
behavioral1
Sample
92008bf5b0f9a406b65c00fbdb6c71e1e1b57ee82781d749f0d5d1c1b46f3fa8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92008bf5b0f9a406b65c00fbdb6c71e1e1b57ee82781d749f0d5d1c1b46f3fa8.exe
Resource
win10v2004-20220812-en
General
-
Target
92008bf5b0f9a406b65c00fbdb6c71e1e1b57ee82781d749f0d5d1c1b46f3fa8
-
Size
631KB
-
MD5
520ab6925e255205194074b7ca3fdc0d
-
SHA1
65087a057635817ef0282f5024acc0bae2be77d0
-
SHA256
92008bf5b0f9a406b65c00fbdb6c71e1e1b57ee82781d749f0d5d1c1b46f3fa8
-
SHA512
55ffe287bf765c67a93cee280daf74107451c91ccdf2c903a6ae63626c55490235b2366315009b94aa5e1ec15f1bf7047f52fe584082e3e81940c7cd5b9407ca
-
SSDEEP
12288:hi3hdfXjwqpDxLy6viYMg0FWxGXiy1JOs8JRRYJdRY+Wsa2w3UxvmL537aKBsMTR:uTjfDxLdv4g+WiiWOzRYhY+iWeLdLssT
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
92008bf5b0f9a406b65c00fbdb6c71e1e1b57ee82781d749f0d5d1c1b46f3fa8.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 622KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 608KB - Virtual size: 607KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 948KB - Virtual size: 947KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ