Behavioral task
behavioral1
Sample
16c00c0baa8290e63b68624517beede5ceb4d967585733e9389edf3731a3b2c4.exe
Resource
win7-20220812-en
General
-
Target
16c00c0baa8290e63b68624517beede5ceb4d967585733e9389edf3731a3b2c4
-
Size
840KB
-
MD5
6f0e4e5c79b47f9a1e8e2b3d9097eeaa
-
SHA1
b4fe97e13dd732e8fd4094fa3aa6305ca68875fd
-
SHA256
16c00c0baa8290e63b68624517beede5ceb4d967585733e9389edf3731a3b2c4
-
SHA512
e5a448791e8b0888b1aaddbdbf8fcf7a431357f5b9f28e792e26301aa9017417b4718e6761dddf3cd651b6a1e72f24a776b6b41101b81fcd496cabc127791f9b
-
SSDEEP
1536:Oy/fbYoJfC8Lkh93Ln9GSnLW8d87/Bqi//2rgNFlJZkhAqb6HamCzBm3:OyYLpTUSLW8+zPmryGr66mC9m
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
16c00c0baa8290e63b68624517beede5ceb4d967585733e9389edf3731a3b2c4.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE