Behavioral task
behavioral1
Sample
effb4f25391f73efd56fc65fff9f9a221a9b76463d6f7356093d3adb7ed4f10a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
effb4f25391f73efd56fc65fff9f9a221a9b76463d6f7356093d3adb7ed4f10a.exe
Resource
win10v2004-20220901-en
General
-
Target
effb4f25391f73efd56fc65fff9f9a221a9b76463d6f7356093d3adb7ed4f10a
-
Size
86KB
-
MD5
85f8368ff73d257f52e85bd42b954304
-
SHA1
c14f0a3f005e29473a42644ddcaf247551fa417c
-
SHA256
effb4f25391f73efd56fc65fff9f9a221a9b76463d6f7356093d3adb7ed4f10a
-
SHA512
6c8ee087757761d6b2d08cbb2f452caff49d4c1297e3d141e20b0fcd687211f5a59e8548eaa97da103c9c6861ee583fcd64f8f504bf6e08903e29d6ccd490c3a
-
SSDEEP
1536:D/3sGOWkJvMTfUJzT81WmQwcIb48T0R0e/QPVFppHTIM:DcGnjYg1WdwlJT0RBQPfphTr
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
effb4f25391f73efd56fc65fff9f9a221a9b76463d6f7356093d3adb7ed4f10a.exe windows x86
7a7803027531302026dedc7b5f6025f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
Sections
UPX0 Size: - Virtual size: 600KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE