Behavioral task
behavioral1
Sample
4ff2546452135c9932d539ac660b68945e61b4af542ba6906d55d5ed49aeeee0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ff2546452135c9932d539ac660b68945e61b4af542ba6906d55d5ed49aeeee0.exe
Resource
win10v2004-20220812-en
General
-
Target
4ff2546452135c9932d539ac660b68945e61b4af542ba6906d55d5ed49aeeee0
-
Size
38KB
-
MD5
5cf057d0ba3ae1c25908e6efd3d9e5e5
-
SHA1
aa44e152599d504029c6607dcf5cee3730b87d48
-
SHA256
4ff2546452135c9932d539ac660b68945e61b4af542ba6906d55d5ed49aeeee0
-
SHA512
00936a7a33eacea1275e411e6459b3a80cfc902b11a1bd35ded7cab4bb2bb0f62bbbd9d2267e166d8373b07e5e3ab4b47a7b79bc364cd7e6e31cf3bd524f7984
-
SSDEEP
384:RlQjJyzKiXKaFY4vWNvh4goFBcGNG85j73rAbwQBuAa5UbU/K80i5Ff7KShIYr:RG/ifFGpcFBcj6lGuAAUAPnbRhd
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4ff2546452135c9932d539ac660b68945e61b4af542ba6906d55d5ed49aeeee0.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE