Behavioral task
behavioral1
Sample
a4557f92496d1f975f4300e4ec7558aa6b514c7c50671225c94cda896c2d87ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4557f92496d1f975f4300e4ec7558aa6b514c7c50671225c94cda896c2d87ab.exe
Resource
win10v2004-20220812-en
General
-
Target
a4557f92496d1f975f4300e4ec7558aa6b514c7c50671225c94cda896c2d87ab
-
Size
486KB
-
MD5
60a3c3e1a657f3eda177559ce80aa4e0
-
SHA1
3fff695d985347e179c59df3a6da6879d10570e0
-
SHA256
a4557f92496d1f975f4300e4ec7558aa6b514c7c50671225c94cda896c2d87ab
-
SHA512
eb5e722032c6e583164d2f661e879ba43748e74785bfa6499b5b988bd90a3bd51ea7a57692618bad43f1c87cf09b3c5556c2391fe977b13b42fd26f4c8cee24b
-
SSDEEP
12288:MfnnK9zABs+TbFx9SXOPCf8DkqAR8zH0HP4UxSPivPc/iid1:MfK9zUHFpi8/0QsDEaid1
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a4557f92496d1f975f4300e4ec7558aa6b514c7c50671225c94cda896c2d87ab.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 472KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 298KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rol Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE