Behavioral task
behavioral1
Sample
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe
Resource
win10v2004-20220901-en
General
-
Target
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3
-
Size
398KB
-
MD5
6fc485db03eddbe362f781e0dd3628f7
-
SHA1
1d6d0d9fb16a156292856ee0c12841eda27ec10f
-
SHA256
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3
-
SHA512
ce57c2f975436cb0071a3f98f7f927b60da25dae496695e7b8a32b753aeddf2f05042a76af11dfe8d5225af8be3ff2cca3b8f60503606943582f778db124a32a
-
SSDEEP
6144:uYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UO0BHvbFyA3:uSNC80I+cR3R03VseuOiHvgA3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d66c690e67f55e68f1b1a05037d78ea02dc2cc16879adf4fcb3e1ae6392d75d3.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 380KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
XOR Size: 137KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE