Behavioral task
behavioral1
Sample
3d99014e38e75efce3ba663d9f5227587c3135005dd810a0ad08872a6fa93a04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d99014e38e75efce3ba663d9f5227587c3135005dd810a0ad08872a6fa93a04.exe
Resource
win10v2004-20220812-en
General
-
Target
3d99014e38e75efce3ba663d9f5227587c3135005dd810a0ad08872a6fa93a04
-
Size
524KB
-
MD5
7a500c6893edcb255f3fd39166f21a30
-
SHA1
d3ccf8e47531f483dc924c6809912abecec02060
-
SHA256
3d99014e38e75efce3ba663d9f5227587c3135005dd810a0ad08872a6fa93a04
-
SHA512
f50aea4e8a2f659c82ce76c219d2130896a022bafdbf6bc4b94628c9cfde3881795e5ec1ebc77626be5678f5c4490fd70a2199108516bb8162041667553e60e8
-
SSDEEP
12288:SjkArEN249AyE/rbaMct4bO2/7WZn8ET+yZWBgReoizwtUlW6svUx:FFE//Tct4bOs7W5T+aWBgRe3wtUlWdMx
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
3d99014e38e75efce3ba663d9f5227587c3135005dd810a0ad08872a6fa93a04.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 476KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�"z Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE