Behavioral task
behavioral1
Sample
aeaa0b4355b99dfbfdea5ffbea145d1d9a003dbbc209786508706144e41d3b31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aeaa0b4355b99dfbfdea5ffbea145d1d9a003dbbc209786508706144e41d3b31.exe
Resource
win10v2004-20221111-en
General
-
Target
aeaa0b4355b99dfbfdea5ffbea145d1d9a003dbbc209786508706144e41d3b31
-
Size
132KB
-
MD5
3707a09a5d6b10c03e4787d71b03b16e
-
SHA1
59a58fdf9ed4d6441f65b531b3cbf861a711dbfa
-
SHA256
aeaa0b4355b99dfbfdea5ffbea145d1d9a003dbbc209786508706144e41d3b31
-
SHA512
04ac6ddcfa5b9aa5d49d6b73cdcc19c87d399199fe8dcf9da07439e5f0967621176acee41a284bea38e1e95d5ebb525467749f79c0de7b6a77ebc0ff2d596626
-
SSDEEP
3072:0M4HD8z/YkLmtrqpLGniu5PgVExr2e45Ywn3Nx:M8z/RQr/H5Iwr2hYwn3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
aeaa0b4355b99dfbfdea5ffbea145d1d9a003dbbc209786508706144e41d3b31.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 172KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 126KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 56KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 68KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE