Behavioral task
behavioral1
Sample
6cfa0f5b9aec56e20b4909080908c72e285aa1a546396e5051549b3d25a17bd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6cfa0f5b9aec56e20b4909080908c72e285aa1a546396e5051549b3d25a17bd7.exe
Resource
win10v2004-20220812-en
General
-
Target
6cfa0f5b9aec56e20b4909080908c72e285aa1a546396e5051549b3d25a17bd7
-
Size
662KB
-
MD5
146a8a88baafeca5bfd60291334d9758
-
SHA1
6f08b64927d6477dc137c6841c6452f74561f017
-
SHA256
6cfa0f5b9aec56e20b4909080908c72e285aa1a546396e5051549b3d25a17bd7
-
SHA512
e2f6dade7c1d928bf7c4be8c6864468b53788b16572a479cdb37d12a703f1ab1ce6f33fc74347bf2c9c3a431893f3f7313489c63ddf57af73483d8f334e4f683
-
SSDEEP
12288:bzRZb4Sb/vE1dImQLn3X9Ws4cAnBVws01VYUF0V21d0yTzgKu:bzXPhBL3X9Ws4cADwsqVYKa2nR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6cfa0f5b9aec56e20b4909080908c72e285aa1a546396e5051549b3d25a17bd7.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 792KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 630KB - Virtual size: 632KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 431KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ