Behavioral task
behavioral1
Sample
upx_mod.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
upx_mod.exe
Resource
win10v2004-20230220-en
General
-
Target
upx_mod.exe
-
Size
5KB
-
MD5
be3ffd8e334a36ac7583617c4f48a345
-
SHA1
31fcfc43cf9f3ad59a9a6b26e4c4d11074ec9c1a
-
SHA256
c16889a6915a6be720ce1b4c77c372bf7ae44ba6fb2e3d3a36c35a007152ac89
-
SHA512
a16baece01f4b3fdb4039f9614828c13d3c2f4c07db1ab964209db2aad51a6d32db2a544a49cbdf0bf57988133c3545c39804ac0074b33236d5d876dc1992a7e
-
SSDEEP
96:1+6QaESNru8zn0W1O1lYVa4oERs/tQllfKRqzX7:1+7aFNru8AW1MlYIERetkCsz7
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
upx_mod.exe.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE