Behavioral task
behavioral1
Sample
f7a3ea1b81fffa97040cea7cac47c2d5fbb35ef9d2f2963b4db87f92c12b6081.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7a3ea1b81fffa97040cea7cac47c2d5fbb35ef9d2f2963b4db87f92c12b6081.exe
Resource
win10v2004-20220901-en
General
-
Target
f7a3ea1b81fffa97040cea7cac47c2d5fbb35ef9d2f2963b4db87f92c12b6081
-
Size
592KB
-
MD5
52088b086c260e15b44eea53fb9b09e0
-
SHA1
4a03e61f38a12164d5ce770a3dc3c4f1cb37878d
-
SHA256
f7a3ea1b81fffa97040cea7cac47c2d5fbb35ef9d2f2963b4db87f92c12b6081
-
SHA512
6d0d77336b4598de5db744239fc42b131c9abfb3f770b5d9b780b28b8bb4b0ebc0ed7e28e0c73b36d69572e4fb369708a23e29d076bb15490bcf7b5191ffc600
-
SSDEEP
12288:dkUi831MjnpgHGstGHgiF+rohb0Li/xUTfS:Sf+1MQGAi8ry0eu
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f7a3ea1b81fffa97040cea7cac47c2d5fbb35ef9d2f2963b4db87f92c12b6081.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 376KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 168KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 311KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE