Behavioral task
behavioral1
Sample
6c72bef4e56cad40bafcec7744cca9c8573eb8a228df2ad9b1c11f81b07f1cad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c72bef4e56cad40bafcec7744cca9c8573eb8a228df2ad9b1c11f81b07f1cad.exe
Resource
win10v2004-20220812-en
General
-
Target
6c72bef4e56cad40bafcec7744cca9c8573eb8a228df2ad9b1c11f81b07f1cad
-
Size
682KB
-
MD5
41e9d13dae20ef748ab677124f7b497a
-
SHA1
f5cc859b93b651760c2ec294f3c309fe9690a590
-
SHA256
6c72bef4e56cad40bafcec7744cca9c8573eb8a228df2ad9b1c11f81b07f1cad
-
SHA512
9462a0f4410d38d81413c031754d98734ffad6eeea1655c763e8c1f6f327b274a5afa7fe6b098b785ddf42e4f1a3a7bd00b6959e18653f56c1492f0115464cbb
-
SSDEEP
12288:a6nTohdYEQPYInYrZEe4lQVMBihcT1mFHPOZVVFgZVWj:FTyYEQJnYrie0QV8ihcT1mFHPOxmZw
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6c72bef4e56cad40bafcec7744cca9c8573eb8a228df2ad9b1c11f81b07f1cad.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 396KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 219KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7� Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE