Behavioral task
behavioral1
Sample
3d678b5dde41b5b0bc1fd2cffbcc0aa670256e22005a8970f3c8a5e7c6e7dca6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3d678b5dde41b5b0bc1fd2cffbcc0aa670256e22005a8970f3c8a5e7c6e7dca6.exe
Resource
win10v2004-20220812-en
General
-
Target
3d678b5dde41b5b0bc1fd2cffbcc0aa670256e22005a8970f3c8a5e7c6e7dca6
-
Size
644KB
-
MD5
931ee3a26e1e6553e0b0bfd0c7cd87d3
-
SHA1
6b9cfe1abfe95725e5881e4e210d7a0290aaa650
-
SHA256
3d678b5dde41b5b0bc1fd2cffbcc0aa670256e22005a8970f3c8a5e7c6e7dca6
-
SHA512
92b44980e3195cb4576e774a33603681f7d46a087ffaa6ceabcb1456f142210bc4ebf63c6dd4b7ac8131a88664d25149c0e071c897371ebcecae207a3f4c662e
-
SSDEEP
12288:g24/2pqUNlMryujHc9h0n8XED3fAbleAiWu7Zxyg9S+0XF:4/2bYyujGWfgcAiWutS+yF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3d678b5dde41b5b0bc1fd2cffbcc0aa670256e22005a8970f3c8a5e7c6e7dca6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 44KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ