Behavioral task
behavioral1
Sample
bda469d0539a00729048d612f1eb512305774f989fdca2f50f9b161755f67bb6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bda469d0539a00729048d612f1eb512305774f989fdca2f50f9b161755f67bb6.exe
Resource
win10v2004-20220901-en
General
-
Target
bda469d0539a00729048d612f1eb512305774f989fdca2f50f9b161755f67bb6
-
Size
431KB
-
MD5
e8f83dd7c3d52c070f5e78a6a4935738
-
SHA1
da1ae5e521925053ce784720334dcfa3fda647e2
-
SHA256
bda469d0539a00729048d612f1eb512305774f989fdca2f50f9b161755f67bb6
-
SHA512
e94038141213cf737239e1d3b4daa060b534bbc510d42485bb1d564eca0e65606ab731f5e2890caafbe09e9a8d4cc9aa801af6d93aae7174142d24e2f7265a26
-
SSDEEP
6144:DaoU3XmnKdgPP8iB1zrj1AZT1UmtvPRxCf4ycYv/yFKCC0Rkl4FtlmMbY:zUFdgPP8ijzrjOLZs4RiKcCCyEQoM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bda469d0539a00729048d612f1eb512305774f989fdca2f50f9b161755f67bb6.exe windows x86
5e65f06519475f85e252621347b24f7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
DllFunctionCall
__vbaExceptHandler
ProcCallEngine
Sections
UPX0 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.packet Size: 417KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE