Behavioral task
behavioral1
Sample
59d0245ac6359fddf1bf965e35587d76e5c52563c9c87cb2f08c0ba5d714da18.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
59d0245ac6359fddf1bf965e35587d76e5c52563c9c87cb2f08c0ba5d714da18.exe
Resource
win10v2004-20220812-en
General
-
Target
59d0245ac6359fddf1bf965e35587d76e5c52563c9c87cb2f08c0ba5d714da18
-
Size
159KB
-
MD5
74d870fcaa24cf704bc07eb61bf7adcc
-
SHA1
b42e067c50786b0207de1485c20abd45c7af5fd0
-
SHA256
59d0245ac6359fddf1bf965e35587d76e5c52563c9c87cb2f08c0ba5d714da18
-
SHA512
ccaeaca24dea7902498578ffdbc969325fa8b910cce9aa36982d07e2474b52da655afdfa8a3f0d5ef3a2aac23bd2db5a2b6bbe73b594aabf8a720db440ca8e4e
-
SSDEEP
3072:n6eSo1AhNTDBNEd1JpjpG/hC+2EIpPd+Wm9GbG9hrT0nLBp6VrDF/a6hJoU:nCA6/Bc1Ji/+ltUeG96NMVJ/X
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
59d0245ac6359fddf1bf965e35587d76e5c52563c9c87cb2f08c0ba5d714da18.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 158KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ