Static task
static1
Behavioral task
behavioral1
Sample
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe
Resource
win7-20220311-en
General
-
Target
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0
-
Size
233KB
-
MD5
cc16e6e7af14fcf5f4a001b85930dc8f
-
SHA1
580b5baff09663396fb27d52e43a58ef25ed43dd
-
SHA256
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0
-
SHA512
c451ec2e3056086842b52e8105a04a67a50609d1e8a7c296e7171432ccc5572c62e69b1edb8d6e600ddb451240847ba4d8621452ea99e98036978cc3712274d9
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
8e6dd1a50d58aef4a86f76c340f6a36faee0ec4f97886978d43a870be5b508f0.exe windows x86
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 77.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 221KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE