Behavioral task
behavioral1
Sample
c5635d385b4a7e4e5c7ea913296a5398925041a83a0b97e7006df6fabd0d12b8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5635d385b4a7e4e5c7ea913296a5398925041a83a0b97e7006df6fabd0d12b8.dll
Resource
win10v2004-20220812-en
General
-
Target
c5635d385b4a7e4e5c7ea913296a5398925041a83a0b97e7006df6fabd0d12b8
-
Size
89KB
-
MD5
489987193e4488ded933d203b4b19690
-
SHA1
416421cb17f20ba896abda375d08a10fa7b65f4c
-
SHA256
c5635d385b4a7e4e5c7ea913296a5398925041a83a0b97e7006df6fabd0d12b8
-
SHA512
1f1ab88c22e62e1e2c140e367d5b5fe8a495a48ca1fbd75a91a7231a762f5a00461cc92fc394fc7de2c5dac056587b1ded449a107f23a50787ae9faf6d38808c
-
SSDEEP
1536:wQLAP+OWCDEJSJUQodleRdV7fdxrDZu5p4l6Gct4sPwYcGKu5KCm40:7K+/tE+Q6leDR3A4lhct4sPwZ255mF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c5635d385b4a7e4e5c7ea913296a5398925041a83a0b97e7006df6fabd0d12b8.dll windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE