Behavioral task
behavioral1
Sample
d68e9d7cdac2aa6c86c98eecac970178dd80ebf50e3463bcceccc93f827751b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d68e9d7cdac2aa6c86c98eecac970178dd80ebf50e3463bcceccc93f827751b8.exe
Resource
win10v2004-20221111-en
General
-
Target
d68e9d7cdac2aa6c86c98eecac970178dd80ebf50e3463bcceccc93f827751b8
-
Size
31KB
-
MD5
02896de5200a4cdf9774d421ff5f3840
-
SHA1
e7b3b3c0d5f1168991c304f68e2744490f7896e8
-
SHA256
d68e9d7cdac2aa6c86c98eecac970178dd80ebf50e3463bcceccc93f827751b8
-
SHA512
f9ca2b0c549a291b65379691892943b73b577947a2b675cdb90242b4d6982bdaf5f24b5c807b60405c4147f8d72ab24342e527556473b73b24af6b828c151637
-
SSDEEP
768:7G/19o5p0Ji+qmzlAQNP0LA+tipsxMHaQElc6nu:7G99oQ+mnP0JtipX6Q/6nu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d68e9d7cdac2aa6c86c98eecac970178dd80ebf50e3463bcceccc93f827751b8.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ