Behavioral task
behavioral1
Sample
PS3_NET_Server.exe
Resource
win10v2004-20230220-en
General
-
Target
PS3_NET_Server.exe
-
Size
487KB
-
MD5
1217b5105966ef5a45a88eefdac4e72c
-
SHA1
a61d1af21bb8ae3459138eeb3ab8f087c66288af
-
SHA256
7f36987692cb86fc6bada6769ad15a1f345c82500deb01513a7a1f8a4f9a5932
-
SHA512
7cce2013d17ff458037ca692c8f3d56d2f25631babb4df62aa05926175d093d3e010e0c557cebcf9122797c1f482aaf17efc8c9c49bbd5986da4514d3e3e70d4
-
SSDEEP
3072:stfMUIyucpP3/iPV6//fAzwlw0vyz6xtu3bvWKIUW/lJCq6bHaewW2oEWHPhVVwu:sd5ucpHF/LdvoSWbvW3RybHaewW2oEW
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
PS3_NET_Server.exe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 201KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 285KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 951KB - Virtual size: 951KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ