Behavioral task
behavioral1
Sample
be486ecc4152e450760d4af86989b4da13854d3fd667ee0bba952dd3ce9bebbc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be486ecc4152e450760d4af86989b4da13854d3fd667ee0bba952dd3ce9bebbc.exe
Resource
win10v2004-20220901-en
General
-
Target
be486ecc4152e450760d4af86989b4da13854d3fd667ee0bba952dd3ce9bebbc
-
Size
27KB
-
MD5
695540a91447b36f942675a41f6b5cd2
-
SHA1
14a7e8c728ab1d47d85082cae2c28e315092db28
-
SHA256
be486ecc4152e450760d4af86989b4da13854d3fd667ee0bba952dd3ce9bebbc
-
SHA512
15ca2c48ee8df8dadbeca0b5130e9e803b68a42bef17d6941c3da707d7ddeca140a95b81cf86541414250d693b74dc5ad649c7b50eabc1e0a92ededb7b5eee00
-
SSDEEP
384:YqrNRbNF7B0HSRdQ28n2KYZ+GelbFM8/u5/H3D07D6DxCY:YgN5N782Ki703Cv
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
be486ecc4152e450760d4af86989b4da13854d3fd667ee0bba952dd3ce9bebbc.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE