Behavioral task
behavioral1
Sample
dad41f11100ee608c04e9c3f06b7b5c4d52afee8c6211197804224f5299ab420.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dad41f11100ee608c04e9c3f06b7b5c4d52afee8c6211197804224f5299ab420.exe
Resource
win10v2004-20220812-en
General
-
Target
dad41f11100ee608c04e9c3f06b7b5c4d52afee8c6211197804224f5299ab420
-
Size
186KB
-
MD5
40a72de5b30178ee97fadced8435d0c4
-
SHA1
ac2cde772904246c1ca409406e1533c0f034642f
-
SHA256
dad41f11100ee608c04e9c3f06b7b5c4d52afee8c6211197804224f5299ab420
-
SHA512
1e190d3336c1af02cc72c63ed8c942c3b0c2e15600c4b12681122ef9dc2ad6895132c1692e2542762b4814570d9cfa03b85a7e04f212c28ad640570c56e8b8ca
-
SSDEEP
3072:8XZ6UZK20Kosx6NbSqOoatipdc0UPS2jQ:KAWK7Ko6ELIidd1
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
dad41f11100ee608c04e9c3f06b7b5c4d52afee8c6211197804224f5299ab420.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE