Behavioral task
behavioral1
Sample
d8e859e912296c909e6b8eccdeaa633284aa6f66b1a37ef263872b40e9f5136f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d8e859e912296c909e6b8eccdeaa633284aa6f66b1a37ef263872b40e9f5136f.exe
Resource
win10v2004-20220812-en
General
-
Target
d8e859e912296c909e6b8eccdeaa633284aa6f66b1a37ef263872b40e9f5136f
-
Size
20KB
-
MD5
6e7d222246c16e2059e52c231569b951
-
SHA1
65a8e19069e534303c83c667edea924750892a4a
-
SHA256
d8e859e912296c909e6b8eccdeaa633284aa6f66b1a37ef263872b40e9f5136f
-
SHA512
fab5bd84aaafec54be6fa73e9e89f7e991047334770f798865e2ee28a068fc1e1c6f28b19bbb66fa85d107bf343aa944c31cb91d1d96b114d2ded39c89059655
-
SSDEEP
192:5T0HVFnXlKyFMOJd1BPSXPe2T7GCkE80XuPJe/XXXO3Gwj9hoO:RwznVKyqCvPSryiZu+HXFO
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d8e859e912296c909e6b8eccdeaa633284aa6f66b1a37ef263872b40e9f5136f.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE