Behavioral task
behavioral1
Sample
56c866b95051aceb9ad5a72075ca1a91eb1a35d922919726d784d92e2accf0f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
56c866b95051aceb9ad5a72075ca1a91eb1a35d922919726d784d92e2accf0f7.exe
Resource
win10v2004-20220812-en
General
-
Target
56c866b95051aceb9ad5a72075ca1a91eb1a35d922919726d784d92e2accf0f7
-
Size
244KB
-
MD5
611afa122f666276d16cddb076dc0ac4
-
SHA1
e7b47c7632043be082c46df66c148f8c2f83b20d
-
SHA256
56c866b95051aceb9ad5a72075ca1a91eb1a35d922919726d784d92e2accf0f7
-
SHA512
6a2b943e894f2bc2f89962ca065c70a1956b05e943b62c4d9112e28f04df11afdef93f07580be4770acfbfde195724e3af944e4e059bd4e37500914694d9b583
-
SSDEEP
384:MfheZWIKykfryT7bJ5kL2XuuVjGn1WqiTKu:khNHK7bAMHVjG1bMKu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
56c866b95051aceb9ad5a72075ca1a91eb1a35d922919726d784d92e2accf0f7.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 195KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zwt Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE