Behavioral task
behavioral1
Sample
8d131190b3ff2b879797a35e5ccbeb032691e673c76b6e528235d2136291c7a2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d131190b3ff2b879797a35e5ccbeb032691e673c76b6e528235d2136291c7a2.exe
Resource
win10v2004-20220901-en
General
-
Target
8d131190b3ff2b879797a35e5ccbeb032691e673c76b6e528235d2136291c7a2
-
Size
455KB
-
MD5
7d298bfc002085d21f019c7587ec7500
-
SHA1
4a678739e6f4487a6c12d34c882c1396db9b93eb
-
SHA256
8d131190b3ff2b879797a35e5ccbeb032691e673c76b6e528235d2136291c7a2
-
SHA512
3712173bd634ed3a6bbd908e9dfcb08b9fa19e3080eebd42cedf080322f00ceeb14e257c0aa2f5f832e4de2ce812fb0bed05a86990de8879fe8c93d4bba576f1
-
SSDEEP
12288:ojkArEN249AyE/rbaMct4bO2/VLmNddBvqmf58v:zFE//Tct4bOsC7Bd8v
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
8d131190b3ff2b879797a35e5ccbeb032691e673c76b6e528235d2136291c7a2.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 472KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 263KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.test Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.test Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE