Behavioral task
behavioral1
Sample
71107b4b8050cbf97788dfc16c2999b7d2580686f57ec6bba5c401ad67d8faa4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
71107b4b8050cbf97788dfc16c2999b7d2580686f57ec6bba5c401ad67d8faa4.exe
Resource
win10v2004-20220812-en
General
-
Target
71107b4b8050cbf97788dfc16c2999b7d2580686f57ec6bba5c401ad67d8faa4
-
Size
40KB
-
MD5
733bd93f55ceebf0176e5ecfee404930
-
SHA1
cefdf090bcad4378907a2722dd8de28c9d431f55
-
SHA256
71107b4b8050cbf97788dfc16c2999b7d2580686f57ec6bba5c401ad67d8faa4
-
SHA512
009ae3f8dc57fb7916ea4cac69dcfe301072ce8cdd604711c65e811403deafc9c3b183b551dfabc294203b3998f3bfb1b44563fb095bc5ea6d364fef6b632886
-
SSDEEP
384:V5P6d+tTZcrUAPkjMZlm5P6d+tTZca/r4uMu:V964fAPdZM964hr
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
71107b4b8050cbf97788dfc16c2999b7d2580686f57ec6bba5c401ad67d8faa4.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pb Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE