Behavioral task
behavioral1
Sample
d068c3aa9cbf5e2f61fef09398694620ee5414cec40c32e6afffdf2264a0f823.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d068c3aa9cbf5e2f61fef09398694620ee5414cec40c32e6afffdf2264a0f823.exe
Resource
win10v2004-20220812-en
General
-
Target
d068c3aa9cbf5e2f61fef09398694620ee5414cec40c32e6afffdf2264a0f823
-
Size
19KB
-
MD5
3d6e9ebe28490aec26147139b55fd35c
-
SHA1
3da79666f9d76c299a26b51fbe3391ed0eea627a
-
SHA256
d068c3aa9cbf5e2f61fef09398694620ee5414cec40c32e6afffdf2264a0f823
-
SHA512
4c7e0b7908c678355133864d73ede54f7969097a3f565b877fa7beb98c08fe79434bdb60f9de9b73ed502e2cf93860e4b9cca7063f71542be1797a852f127564
-
SSDEEP
384:kvRAwOkMIHZ2i1ia1pQDeiGHZWutBOTAD+8yvsG:k6wPj52ig4iGHZlBOTPk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d068c3aa9cbf5e2f61fef09398694620ee5414cec40c32e6afffdf2264a0f823.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ