Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp
-
Size
29KB
-
MD5
03420503492876831fe357bab392ca17
-
SHA1
d3ca0ff647471f9ba82db7ffbe1666532d1a6295
-
SHA256
d9ffc2f3a4b9d8241db6318ee0f365862f499e041af2fc615a08b0680f265fe1
-
SHA512
2e48f798f1c4d2c3e1cbd34eca1c724fdea962354f9222ab357d238770ed329ef1fd743f45c4bbe3364742b40b05ad5aab6d2f7c7d4ab47a3dc9ad654a0c3282
-
SSDEEP
768:lk8fRyRdrZUoovLBTf2dxW4xHnPgvM0d:lk8fyrkvL10DxoE
Malware Config
Signatures
Files
-
tmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe .vbs windows x86