Behavioral task
behavioral1
Sample
4a4e0c372657f379ad6a57ed1e5c0441199f8f874b923c5d2d6175b743947ec8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a4e0c372657f379ad6a57ed1e5c0441199f8f874b923c5d2d6175b743947ec8.exe
Resource
win10v2004-20220901-en
General
-
Target
4a4e0c372657f379ad6a57ed1e5c0441199f8f874b923c5d2d6175b743947ec8
-
Size
95KB
-
MD5
60f22f8b21e2b1ab8bddb087e859f4c4
-
SHA1
58dece36266de464050ed7e40567f2ee290ddb7c
-
SHA256
4a4e0c372657f379ad6a57ed1e5c0441199f8f874b923c5d2d6175b743947ec8
-
SHA512
ea6b5b39abacb5283fc679d97e3a6681d0adea65e32a9229fdad7c2a0beab57a127b39e14115775561e0a45e7cc57f970ebd452cee1ef6a56b5c21c246f4d166
-
SSDEEP
1536:Yu0qpsgINo29A41RA2cKtL0vlR1SCH2qYYtMQhotZYd:Yu0Wsg29ps2cxtnSCCehhotZA
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4a4e0c372657f379ad6a57ed1e5c0441199f8f874b923c5d2d6175b743947ec8.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE