Behavioral task
behavioral1
Sample
b5a89c13526712295b3838f2f270f37cd167668a2c03eb72633e115f28b1de52.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b5a89c13526712295b3838f2f270f37cd167668a2c03eb72633e115f28b1de52.exe
Resource
win10v2004-20221111-en
General
-
Target
b5a89c13526712295b3838f2f270f37cd167668a2c03eb72633e115f28b1de52
-
Size
187KB
-
MD5
2e48714f7db1f2b0eaaaf434cc5c3cd1
-
SHA1
a8b0a839fb0f1fadcfcb3b51ba1fc214bd3b8fe2
-
SHA256
b5a89c13526712295b3838f2f270f37cd167668a2c03eb72633e115f28b1de52
-
SHA512
411df9d0137620a9902c99fd867895d104450c265943d5d7785a7d02a35e80bf015679fe20263dc645448698005b4d8c5fffcf9a097429f6f575a4469130a7dc
-
SSDEEP
3072:rKiKyAKudBKdYIhxOJZpUvCzdoHD1U3VXEtWzYey06XmFX/eFvaIh1kSXS4VNfEV:OiKxnCYexOVwCmHRUJDzYey06XmR8Oee
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b5a89c13526712295b3838f2f270f37cd167668a2c03eb72633e115f28b1de52.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 3.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 200KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ