Behavioral task
behavioral1
Sample
6acb9ec1ee16c3616a5ca010c7b33e8a9f1b4ebc3aa1be6867ef88a73609f3f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6acb9ec1ee16c3616a5ca010c7b33e8a9f1b4ebc3aa1be6867ef88a73609f3f7.exe
Resource
win10v2004-20220812-en
General
-
Target
6acb9ec1ee16c3616a5ca010c7b33e8a9f1b4ebc3aa1be6867ef88a73609f3f7
-
Size
217KB
-
MD5
2f2e8bf5b826da03ed8d6750eef98b75
-
SHA1
d3a5bebe2f892232aa04f33db9625ab94201e2e9
-
SHA256
6acb9ec1ee16c3616a5ca010c7b33e8a9f1b4ebc3aa1be6867ef88a73609f3f7
-
SHA512
972fdf463d92f2e11cf6f36d65ee4c989c2277d5aac7653e2c1c8d67ef217a6a045ad5f5310c2bbbded84d195b6a240c382a3983d47a269bbbb96f0c66c619a5
-
SSDEEP
192:MXBwnvBdf/IuDiAmNau++iSfLV/6xvd2aS0evMK:MRc3f/Iu/kaPPSfLYvPG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6acb9ec1ee16c3616a5ca010c7b33e8a9f1b4ebc3aa1be6867ef88a73609f3f7.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE