Behavioral task
behavioral1
Sample
f2f20dcab4a86bcd702000a74be664335650b5e8f64d83b44b64410cf79fd7e2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2f20dcab4a86bcd702000a74be664335650b5e8f64d83b44b64410cf79fd7e2.exe
Resource
win10v2004-20221111-en
General
-
Target
f2f20dcab4a86bcd702000a74be664335650b5e8f64d83b44b64410cf79fd7e2
-
Size
442KB
-
MD5
a29b558640e736db3d4bb8d8011ae22e
-
SHA1
34c140b89cc9144f293d3c0529e282a94df23bf6
-
SHA256
f2f20dcab4a86bcd702000a74be664335650b5e8f64d83b44b64410cf79fd7e2
-
SHA512
b69797b066255f7c679c3d63fda80fcc94c1e7e83703b5c829bd2bff83e232e873ff9c04376205abee29824fe7fe89ca24bbea902256bce7495fac9763d9b1e6
-
SSDEEP
6144:DV5M4mPieHwaPSFZWERgFQuxYKgk/2MoVc+kOddfWI0s9POHbOQCStUshpwLnaRP:BvmPieRPSFQuOQ0WkD92j9Py15tFwL+
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f2f20dcab4a86bcd702000a74be664335650b5e8f64d83b44b64410cf79fd7e2.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 292KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 438KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 332KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
373rjFWm Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat_97 Size: 135KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ