Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win10v2004-20220812-en
General
-
Target
spoofer.exe
-
Size
651KB
-
MD5
9de3cebe956e46236be9b26d2eee3f77
-
SHA1
82e7bd49a969ffd0f674e867dc09f66f9201d6a2
-
SHA256
518d609bd1c2fc7a618c6e52130234a5b74ea16f35d082155bcf1e40af58f4c1
-
SHA512
70b46c74fb552cfa2480ce8684bf4340deb6d03a90d660f05911dc8b0006c84d201d80de5d599eb4c4a21de8e7e310157bf15ad62a6c40654fb577e6eccc3367
-
SSDEEP
12288:bm502xmBA3REw0mQxkZfBS1HLUnwYbN5jVHL28P9SoHLMP:bm5vmBA3RHQxkZQLI7bDJHaa9SoHoP
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
spoofer.exe.exe windows x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 648KB - Virtual size: 648KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE