Behavioral task
behavioral1
Sample
68af0a3319f839298c776d69704b9dde71d2064ab0cc7d2ba65acc525e18ca05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68af0a3319f839298c776d69704b9dde71d2064ab0cc7d2ba65acc525e18ca05.exe
Resource
win10v2004-20220812-en
General
-
Target
68af0a3319f839298c776d69704b9dde71d2064ab0cc7d2ba65acc525e18ca05
-
Size
169KB
-
MD5
73f5bdbfb10374335227cc3f8eff8200
-
SHA1
2fb2b7c6d1e67d69d47deeac5272fef9ef280bf3
-
SHA256
68af0a3319f839298c776d69704b9dde71d2064ab0cc7d2ba65acc525e18ca05
-
SHA512
ad5db429c26304f3fb48a56ec61167aabc29e18cf78daac5eaa20d377e007fdef28d7ac9c4834aba6e4804507fd900f109aed300a1ac1bcebffddc0e96275e28
-
SSDEEP
3072:vbs2MlSaafVA4fscsui//D+G7japmvBu7pHt6:vbccVA4lp7pHt
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
68af0a3319f839298c776d69704b9dde71d2064ab0cc7d2ba65acc525e18ca05.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE