Behavioral task
behavioral1
Sample
4bb339665e2c8020c44988ebd20fdba861fecee4f8d65f6b80f7d69f032f7ff2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4bb339665e2c8020c44988ebd20fdba861fecee4f8d65f6b80f7d69f032f7ff2.exe
Resource
win10v2004-20220812-en
General
-
Target
4bb339665e2c8020c44988ebd20fdba861fecee4f8d65f6b80f7d69f032f7ff2
-
Size
217KB
-
MD5
52f42bbfdf00a9800963610f4c116890
-
SHA1
8763d383770ad31688d72239f3992c78d9113a67
-
SHA256
4bb339665e2c8020c44988ebd20fdba861fecee4f8d65f6b80f7d69f032f7ff2
-
SHA512
7f7a6304a999d80470a2a200b0c574077434423d86c62b06dd178ddd79649ec595c5dc91b78f994fe85e779b48614d3e2d889a8c40c9445651ac84ccfe64fc63
-
SSDEEP
3072:Bw5o05n2ThWsNexPnCrnS5n2ThWsNexPnCrnjSwhPgK:mnkP+6bwnkP+6bZlp
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4bb339665e2c8020c44988ebd20fdba861fecee4f8d65f6b80f7d69f032f7ff2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE