Behavioral task
behavioral1
Sample
9031c1ca6e76497ad0779c75ac646c69471947cd6fd0a3ac70dc8817e8839547.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9031c1ca6e76497ad0779c75ac646c69471947cd6fd0a3ac70dc8817e8839547.exe
Resource
win10v2004-20220812-en
General
-
Target
9031c1ca6e76497ad0779c75ac646c69471947cd6fd0a3ac70dc8817e8839547
-
Size
17KB
-
MD5
f63568d4b894008c5f09ab759a91134c
-
SHA1
c30b70ac3356fca2bf390945f6bde0cc0ca9c9ee
-
SHA256
9031c1ca6e76497ad0779c75ac646c69471947cd6fd0a3ac70dc8817e8839547
-
SHA512
5f78238c5fe2ab5223f93fca5eecad04b28eeac97e114c3051f27ef4ec1798a82aebb7b1f13727843f53f98004034d3904a3330428e8d24893ae7b4321c680c9
-
SSDEEP
384:fSAcaf38+/jrn3BWwAxxcs+vHWX3Q2OA4I1HTvngqpMJr:frDJrxWwexsHOLEr
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9031c1ca6e76497ad0779c75ac646c69471947cd6fd0a3ac70dc8817e8839547.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ