Behavioral task
behavioral1
Sample
cb4cd7f137ef9b27389fa1256db41ef4b4b3e9d794be661d8ca9b06dc7ddf514.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb4cd7f137ef9b27389fa1256db41ef4b4b3e9d794be661d8ca9b06dc7ddf514.exe
Resource
win10v2004-20220901-en
General
-
Target
cb4cd7f137ef9b27389fa1256db41ef4b4b3e9d794be661d8ca9b06dc7ddf514
-
Size
28KB
-
MD5
7a3bcdfb1a7e9a2e7d22e9680bada4ca
-
SHA1
434017ad2508a55f829653183272e89293fb9914
-
SHA256
cb4cd7f137ef9b27389fa1256db41ef4b4b3e9d794be661d8ca9b06dc7ddf514
-
SHA512
93bdea69e68b78f1e4be1005e0da68ceef94f066e953b25bf4fce7ccb4a1cd413b22bfe799f37395df0b5a4f418ebe80ae38f7594a2781f966f510e2a1d1ba52
-
SSDEEP
192:i2v7Ic6S0wO75JeWgKSgKd2UbdbmCFpIBOBcSrW7bZ09k8su5bA57I2b4a96moti:iwQ7KJpYOKSrubZ0m8f5bCN9Et
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
cb4cd7f137ef9b27389fa1256db41ef4b4b3e9d794be661d8ca9b06dc7ddf514.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE