Behavioral task
behavioral1
Sample
b5a1e70219a511f2073b59c3eb1eb1784267152379aa41961921b44ae5bb8404.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5a1e70219a511f2073b59c3eb1eb1784267152379aa41961921b44ae5bb8404.exe
Resource
win10v2004-20220901-en
General
-
Target
b5a1e70219a511f2073b59c3eb1eb1784267152379aa41961921b44ae5bb8404
-
Size
48KB
-
MD5
928d45e06646732dac1db3ae141bd549
-
SHA1
04dd928749b0db451810973e28bb5f47ef367909
-
SHA256
b5a1e70219a511f2073b59c3eb1eb1784267152379aa41961921b44ae5bb8404
-
SHA512
c83dbd08018026e81ec470a95de3d3479270f1399c1a8c53ab6bcd2bc4f2705b65193dd7c673b3c82057ffc05e3dcabf25edad5d7869d1ccab7eb8cf8aac1e71
-
SSDEEP
768:USdh7g7WRJB1T/IePwrdYTKyiwD9u/uAD1xCEkx:USHuqHZPwre2Kh+u6kx
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b5a1e70219a511f2073b59c3eb1eb1784267152379aa41961921b44ae5bb8404.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
diikei Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
diikei Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE