Behavioral task
behavioral1
Sample
390d44ee769f4d8cf7faf9bbef4491c258d7e50a83c962052f319107a65cabdd.dll
Resource
win7-20220812-en
General
-
Target
390d44ee769f4d8cf7faf9bbef4491c258d7e50a83c962052f319107a65cabdd
-
Size
143KB
-
MD5
65f5997fbb96b331c9f921132a51c67d
-
SHA1
5b33c0c8d4c14ce41be12004a84035171cbf572e
-
SHA256
390d44ee769f4d8cf7faf9bbef4491c258d7e50a83c962052f319107a65cabdd
-
SHA512
87f8bab27b91b8a15440e935c19255f9890858ee57cd7ec7ef07bdd58d322e31dae17f0ac7b7b8b11bcbf999fe629a88aeca7f3f1fca58bc6ded32a9f6d75f2d
-
SSDEEP
3072:wkhFAGvN80WReAitJzli13mByix6RQogZR4VUm+m:3PdF80UOloml6oR4FX
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
390d44ee769f4d8cf7faf9bbef4491c258d7e50a83c962052f319107a65cabdd.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE