Behavioral task
behavioral1
Sample
ecfa2ada5d6041b19ac7f68b8298b69185b2df4de0a4f18467e76ec7fc453d47.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ecfa2ada5d6041b19ac7f68b8298b69185b2df4de0a4f18467e76ec7fc453d47.exe
Resource
win10v2004-20220812-en
General
-
Target
ecfa2ada5d6041b19ac7f68b8298b69185b2df4de0a4f18467e76ec7fc453d47
-
Size
236KB
-
MD5
78c9009c365003f40ebbf1ef102597ac
-
SHA1
24a25dc2200e28805c3a3dd0505c4d0bd06a485b
-
SHA256
ecfa2ada5d6041b19ac7f68b8298b69185b2df4de0a4f18467e76ec7fc453d47
-
SHA512
1b260bfd89c378ea0466c49376df70efd8075807eedc22a5c48f6168ed0af8d73d4291a581ca969efb6657cca7a38d9a764c928507166dd248a9f91a888f929c
-
SSDEEP
6144:ZDWtLKuEfm0Aik2EqBFUYsu1FVEeNSDyDISthpZ:ZDeG9Aik2EqzUYf1xSDyttjZ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ecfa2ada5d6041b19ac7f68b8298b69185b2df4de0a4f18467e76ec7fc453d47.exe windows x86
647b2d25b4821905b4195ff7a6455b54
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
Sections
UPX0 Size: 512B - Virtual size: 184KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 168KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE