Behavioral task
behavioral1
Sample
c6dcfd748512e42068e54e1013408593809e433a834096002a48cc5dcde0fffe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6dcfd748512e42068e54e1013408593809e433a834096002a48cc5dcde0fffe.exe
Resource
win10v2004-20220812-en
General
-
Target
c6dcfd748512e42068e54e1013408593809e433a834096002a48cc5dcde0fffe
-
Size
96KB
-
MD5
110eb14091c8f06ab415489c5e3ea11b
-
SHA1
ef9c8520af81297bf7e95d8e91b0ec172f12b7b5
-
SHA256
c6dcfd748512e42068e54e1013408593809e433a834096002a48cc5dcde0fffe
-
SHA512
79bf3cf458e5f95cd079da99e3ffa9e80016731657ffe247eb1657bb40b4ee264ba99dbe7c49bac132aec55b8967d0176875419ed9a70b31cc8d2614e8107160
-
SSDEEP
3072:1HFjk0s+Sien/VtTBfITRur5ZcNTeiP0ZDvm:1lIP+XS/VtTBwRur5ZW4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c6dcfd748512e42068e54e1013408593809e433a834096002a48cc5dcde0fffe.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wkt0 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE