Behavioral task
behavioral1
Sample
e3fa737f9433c1607102daf6799a686dbe93118cb8ad17fd7047ffad80410889.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e3fa737f9433c1607102daf6799a686dbe93118cb8ad17fd7047ffad80410889.exe
Resource
win10v2004-20221111-en
General
-
Target
e3fa737f9433c1607102daf6799a686dbe93118cb8ad17fd7047ffad80410889
-
Size
13KB
-
MD5
e0348cb430202117aaace449e08eeee5
-
SHA1
b8c337dd98f318c521230104dc36e36e662b80d8
-
SHA256
e3fa737f9433c1607102daf6799a686dbe93118cb8ad17fd7047ffad80410889
-
SHA512
b707d983990e9d26a4596aa7c7b01d1ff0d3cbb667cfb0a7df29fcab2a38f1d970f226c63e59d770cba74fea332ea141b1d7d8905a43fdeb4209fba2dab2ad29
-
SSDEEP
384:/otIrgFLWTj+fM+hyPfr5dhq38JtQxX6Ydugu:/otIrgFdfM+hy75/qMQX6u
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e3fa737f9433c1607102daf6799a686dbe93118cb8ad17fd7047ffad80410889.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 142B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ