Behavioral task
behavioral1
Sample
2a3fb6a62b7f434516fc5cdc015fc4709e5106bb7554a2bd43699db7d9489d3f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2a3fb6a62b7f434516fc5cdc015fc4709e5106bb7554a2bd43699db7d9489d3f.exe
Resource
win10v2004-20230221-en
General
-
Target
2a3fb6a62b7f434516fc5cdc015fc4709e5106bb7554a2bd43699db7d9489d3f
-
Size
110KB
-
MD5
91e204c7f2f1ebbfb391e582d583cccd
-
SHA1
b1ef2528ec3ea0c5e906bed59d3416953b80adf9
-
SHA256
2a3fb6a62b7f434516fc5cdc015fc4709e5106bb7554a2bd43699db7d9489d3f
-
SHA512
6fd741285841c0285fadc719c54812aaa645ba27ffdc779413b43ddf9cbbca6224155cf8c93e18cdefd72045ef5a9deb6468fec00f1fe649ea3d382a4e9a82cd
-
SSDEEP
1536:QI8xTv4Wc8MWOwuatcswxdmhI78fhU0YKfOVEQVh4vTLUtYxVfl5HHXiDyoZoFuB:QI8GMtiPyfGSfON/A0tqfvHHyDyWoH0
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
2a3fb6a62b7f434516fc5cdc015fc4709e5106bb7554a2bd43699db7d9489d3f.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 148KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ