Behavioral task
behavioral1
Sample
bda483e371c38929ed699544733565cc4487791f9f2ee3a36cacccfdb29d84e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bda483e371c38929ed699544733565cc4487791f9f2ee3a36cacccfdb29d84e8.exe
Resource
win10v2004-20220812-en
General
-
Target
bda483e371c38929ed699544733565cc4487791f9f2ee3a36cacccfdb29d84e8
-
Size
98KB
-
MD5
7746f341e31c0a4daf64a0a2180c491d
-
SHA1
cc5ce40603ee3cbd3f8551af43ca49dcf1c6ccf8
-
SHA256
bda483e371c38929ed699544733565cc4487791f9f2ee3a36cacccfdb29d84e8
-
SHA512
bf3a82086ebe0c21cb0cc11ec04c0e90190bc8a1258455b9a1f4fbf19c4d93426fd159dd0475d7dff7ea340bcf437574c1fea43dd6663629a3cbb5acbc383947
-
SSDEEP
1536:COO9+ea3qO9LKh4Bea07IRIyjnwmrwqgnBV6Oy:C8kYLrUa0AymrwqgnC9
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bda483e371c38929ed699544733565cc4487791f9f2ee3a36cacccfdb29d84e8.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE