Behavioral task
behavioral1
Sample
45bd56102f6b224a627937dc2f32b00985cf19c0a4102bbe6ecfed8379fc820c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
45bd56102f6b224a627937dc2f32b00985cf19c0a4102bbe6ecfed8379fc820c.exe
Resource
win10v2004-20220812-en
General
-
Target
45bd56102f6b224a627937dc2f32b00985cf19c0a4102bbe6ecfed8379fc820c
-
Size
220KB
-
MD5
6f6d18dd0b2c54d34c44ff0a274399e0
-
SHA1
3d9b01048504fb6e5e482884a9b42946a7a6d2cf
-
SHA256
45bd56102f6b224a627937dc2f32b00985cf19c0a4102bbe6ecfed8379fc820c
-
SHA512
1ddc356658ad10ed093230f15d064901c824f07ae7f2f47755915655a5258f51138bf2213f5b250d66602dab46c5ee091ddfbfd8eb349e72a1e23f46f814b5d4
-
SSDEEP
3072:x+M4vLcITuoLteNfA3Y8O09tSG0WBvrpotQ2yinsNWBmstngwUYk:0sguowleY8OSD0EaPnsNVstRo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
45bd56102f6b224a627937dc2f32b00985cf19c0a4102bbe6ecfed8379fc820c.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE