Behavioral task
behavioral1
Sample
c60dc084bf1edd343f3f69d3a49848265ea712e65d54ed6e772e713197276ca3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c60dc084bf1edd343f3f69d3a49848265ea712e65d54ed6e772e713197276ca3.exe
Resource
win10v2004-20220812-en
General
-
Target
c60dc084bf1edd343f3f69d3a49848265ea712e65d54ed6e772e713197276ca3
-
Size
35KB
-
MD5
a650c6722237d4e5e6523ede33105157
-
SHA1
c5265629e7630cba192d5197481d8be690df2853
-
SHA256
c60dc084bf1edd343f3f69d3a49848265ea712e65d54ed6e772e713197276ca3
-
SHA512
48c33188e0d6202735b77269adf457bdba33c37f99f50852ed6d5dc35d74d2f6bc559ae997912293df342d4614057e924de3397c5a7fd5cfdcfd1834a558e5a2
-
SSDEEP
768:FwPKAgF2OEcrlAr2x045vmX+Y+kVmiinK4eQXk9T3DRDqnfm:bd2urcHAvmX+Y+J/nKMXkBlAfm
Malware Config
Signatures
-
Nirsoft 1 IoCs
resource yara_rule static1/unpack001/out.upx Nirsoft -
resource yara_rule sample upx
Files
-
c60dc084bf1edd343f3f69d3a49848265ea712e65d54ed6e772e713197276ca3.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ