time
Behavioral task
behavioral1
Sample
ef2156c179b2e2a3b11821c25b1ebbc43813bd546823c87cad3ad766e7daf32d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef2156c179b2e2a3b11821c25b1ebbc43813bd546823c87cad3ad766e7daf32d.exe
Resource
win10v2004-20220812-en
General
-
Target
ef2156c179b2e2a3b11821c25b1ebbc43813bd546823c87cad3ad766e7daf32d
-
Size
22KB
-
MD5
21ba8eab66ea0c41a90a486376c6eee0
-
SHA1
7321144dd325668d54b818705440e7edc8b6ac89
-
SHA256
ef2156c179b2e2a3b11821c25b1ebbc43813bd546823c87cad3ad766e7daf32d
-
SHA512
09438f746d11a676dafdc48ef47498e5e124e5c3cd68532a94428e200fec90f61a6a00d43664a8c9e27542b2c0526b837cfbdd992de67c80f1a6e824d949892e
-
SSDEEP
384:5YYWaR+GvjOG5vCOtjgSaKNH7yJhgnUQWPyqAcK3M5uqOxgVwpJUbXZqolVxYiG:RTjbOCvRNfUQvqrK3M5uDxewYZqoyi
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ef2156c179b2e2a3b11821c25b1ebbc43813bd546823c87cad3ad766e7daf32d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE