Behavioral task
behavioral1
Sample
9a3d30842ee02c2778ba96baff066cf9df2e8670c843c8b3e273c543fa5c13f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a3d30842ee02c2778ba96baff066cf9df2e8670c843c8b3e273c543fa5c13f9.exe
Resource
win10v2004-20221111-en
General
-
Target
9a3d30842ee02c2778ba96baff066cf9df2e8670c843c8b3e273c543fa5c13f9
-
Size
2.7MB
-
MD5
5b672f031cc3ef173e1f3098b9a841a1
-
SHA1
354972b6f2518847c7f41917aa3d86ed452dcaa4
-
SHA256
9a3d30842ee02c2778ba96baff066cf9df2e8670c843c8b3e273c543fa5c13f9
-
SHA512
51df3582e6a6017f5fd3e3e8d8f9ed85e4483bb3e7f5b038e3ad40af40ba7e0909cfade4e44fa020e19815e09dec9f34be5055d961379d36c9a2e057079c72c2
-
SSDEEP
49152:qIjvPtp9ZyTgBtY0ZVUGxKyDI21fQ9fflkFn4twilf9o0c3tGtKT1YrNQbqyBt/Y:qIDPtygtY0IyDr1fO3lkFnAH1FcdGtKp
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
9a3d30842ee02c2778ba96baff066cf9df2e8670c843c8b3e273c543fa5c13f9.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 924KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 624KB - Virtual size: 623KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 260KB - Virtual size: 513KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ