Behavioral task
behavioral1
Sample
ca869af68954d6d5f02812a104be76bb18d7391714ecc7ff807fe4fe77672751.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca869af68954d6d5f02812a104be76bb18d7391714ecc7ff807fe4fe77672751.exe
Resource
win10v2004-20220812-en
General
-
Target
ca869af68954d6d5f02812a104be76bb18d7391714ecc7ff807fe4fe77672751
-
Size
1020KB
-
MD5
2307144218e4ed04bc25038e17c72d76
-
SHA1
84624a3ec56ed7e0d8aac245e910a690720a4738
-
SHA256
ca869af68954d6d5f02812a104be76bb18d7391714ecc7ff807fe4fe77672751
-
SHA512
f85cf2a99554ba1b84eedd0189f8f205b1d861a4857a3724fb7d26c99e9349a948dfa1bcd070b33115175c6d366f1e3c68e76bb4873a080fa83dca7fd4ec97cf
-
SSDEEP
24576:rAX1AX1g/Tl3E6EI72hVnEuVIpwrGpGNb9yBXC2MHk:rqAUTl3v72LnDVIpoGpGNAXC2MHk
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
ca869af68954d6d5f02812a104be76bb18d7391714ecc7ff807fe4fe77672751.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE