Behavioral task
behavioral1
Sample
968e4de72ebcb55f53c6dcad03ff1a7355aac55aec4fddf1057db699d22cfea8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
968e4de72ebcb55f53c6dcad03ff1a7355aac55aec4fddf1057db699d22cfea8.exe
Resource
win10v2004-20220812-en
General
-
Target
968e4de72ebcb55f53c6dcad03ff1a7355aac55aec4fddf1057db699d22cfea8
-
Size
643KB
-
MD5
74c6f547f2cf70c422c5fe60ae39df30
-
SHA1
c9df97162f34d2001a6df59257763b00c55969ce
-
SHA256
968e4de72ebcb55f53c6dcad03ff1a7355aac55aec4fddf1057db699d22cfea8
-
SHA512
18e54397a7d6863ef24706c00ee1ab7b736fc78f098df59a62f97616cd39ec8ebeff8bc4140a918c1973ff49e57b7ac53ae84372b5c06dec903000ad855bfa5a
-
SSDEEP
6144:auMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6EvyCPyWzo0naG5:a+YcUc6SBLLTSEgBAnhc1kGzPaG5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
968e4de72ebcb55f53c6dcad03ff1a7355aac55aec4fddf1057db699d22cfea8.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 217KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 424KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE