Behavioral task
behavioral1
Sample
14eb54c448117b4addb3c7fc8ad4e053d8150f1ab9585131276b2d2b75e23ae7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14eb54c448117b4addb3c7fc8ad4e053d8150f1ab9585131276b2d2b75e23ae7.exe
Resource
win10v2004-20220901-en
General
-
Target
14eb54c448117b4addb3c7fc8ad4e053d8150f1ab9585131276b2d2b75e23ae7
-
Size
4.3MB
-
MD5
f2077eb2e36247b390a51ddfae70852a
-
SHA1
0340cba38a1baf99bd002e7189b8ee3b6c17b282
-
SHA256
14eb54c448117b4addb3c7fc8ad4e053d8150f1ab9585131276b2d2b75e23ae7
-
SHA512
0c4ac618efcb647397be9a68e0101b034727ecc7c817966730a74f7ff81f061058b3a6702a58f890bd8f56fb23203978c1c21153ff781c6dd25ce0fe80dca12c
-
SSDEEP
98304:f1zEyh6v883AW4FsatFwfmkzgS0tYQ8OAEfpNHhHeRRsq6L:flEp0UAFHFwuntt/JzHiRsN
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
14eb54c448117b4addb3c7fc8ad4e053d8150f1ab9585131276b2d2b75e23ae7.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 552KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 994KB - Virtual size: 996KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ