Analysis
-
max time kernel
13s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae.exe
-
Size
4.7MB
-
MD5
5a0b60ce0d6463557f4553b476e0bde4
-
SHA1
e3f62e6bc1fd2653ecea2c17d94b672bf99bea89
-
SHA256
6b02cdf76615948ba7555c66130fc759c0c5d6148673c0e6c59dc945553489ae
-
SHA512
98dddabd27af62028738a97575602067b6d0d2f31af116d1fbfe9a6149a5ab493a3ddf15eee4cb4a699a8dc3d9961fc003523ce930f76d9476bdaf7f0a59bd1b
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/580-0-0x0000000000400000-0x00000000010B6000-memory.dmp upx behavioral2/memory/580-1-0x0000000000400000-0x00000000010B6000-memory.dmp upx