Behavioral task
behavioral1
Sample
c35a006f51b35fe06fcb39a674901a3f6081102cf28a82966656e3d463a94ff9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c35a006f51b35fe06fcb39a674901a3f6081102cf28a82966656e3d463a94ff9.exe
Resource
win10v2004-20221111-en
General
-
Target
c35a006f51b35fe06fcb39a674901a3f6081102cf28a82966656e3d463a94ff9
-
Size
69KB
-
MD5
eb2c1560554bd1419bb989e1ccf6fdfa
-
SHA1
a4125e738be59385f38eadb675be274ed55a8021
-
SHA256
c35a006f51b35fe06fcb39a674901a3f6081102cf28a82966656e3d463a94ff9
-
SHA512
ec847e590b773c83e21ff7d24d847697ec1f43aa7aa4da4a800332023d2e93ce0f203c20658a400d99bc6a304774e8ad0756bc9fb30523fc294279e27a86dc32
-
SSDEEP
1536:LLfEUFfR6lwIMO2QyNZlSzC6aKVACyMSUvVNRneM:LLfEUxRQMZQiHR6gnMfNNR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c35a006f51b35fe06fcb39a674901a3f6081102cf28a82966656e3d463a94ff9.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ