Behavioral task
behavioral1
Sample
28bd734dcc04acf3640d2e03768d0e64d3d3dbb9b1abb7c8225e2f111d30aaaf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
28bd734dcc04acf3640d2e03768d0e64d3d3dbb9b1abb7c8225e2f111d30aaaf.exe
Resource
win10v2004-20220812-en
General
-
Target
28bd734dcc04acf3640d2e03768d0e64d3d3dbb9b1abb7c8225e2f111d30aaaf
-
Size
15.5MB
-
MD5
66bcdecb28244cf6a8476ddff339cdac
-
SHA1
c9eddb0adcf93d0632f5f5bdd3dfca03f1f34a9f
-
SHA256
28bd734dcc04acf3640d2e03768d0e64d3d3dbb9b1abb7c8225e2f111d30aaaf
-
SHA512
e8978d396a0d5de0d2dc1a95c2e8c7c1fb940fde06cfcbe11026e758c1eb93e716a537f3d551db282ff502c685aeb6f13e60ca8151eef439caa128d300c1bcea
-
SSDEEP
393216:KEZJ3d5vGwE6yqggV9TRh6YpBy9vXZR/AJSrYhJ7D+OGGn7k0U43ui:KEBZROA1h6aShR/AJo8J7D+OG7di
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
28bd734dcc04acf3640d2e03768d0e64d3d3dbb9b1abb7c8225e2f111d30aaaf.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ