Behavioral task
behavioral1
Sample
ec36c85e4248d5602578eaa9b77f7b30c044930a0ee409c052fcec339077a5fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ec36c85e4248d5602578eaa9b77f7b30c044930a0ee409c052fcec339077a5fa.exe
Resource
win10v2004-20221111-en
General
-
Target
ec36c85e4248d5602578eaa9b77f7b30c044930a0ee409c052fcec339077a5fa
-
Size
31KB
-
MD5
e3718ee29e68c5dd6116ad300ef18679
-
SHA1
d9dbb2669341de39174ddabd15253ece370a225d
-
SHA256
ec36c85e4248d5602578eaa9b77f7b30c044930a0ee409c052fcec339077a5fa
-
SHA512
4dee2585262d417cf84100814267c9c7ca6cdc3942388469cf1985c9d6b7aff087567641e1fa14925af39e7979a916031fe3a11811261adf883fe2ec80648cab
-
SSDEEP
768:D2JsFgiy8YYbD04+lSqO7VWoaexnURhnMN8if5QY3TvPG:KuFOqbY4OSqobhuyGifrO
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ec36c85e4248d5602578eaa9b77f7b30c044930a0ee409c052fcec339077a5fa.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.bss Size: - Virtual size: 357B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ