Behavioral task
behavioral1
Sample
190a7f9e43a20ee90297ee565bcf7da6180254fa022bc06ff5736f2a556d6bbb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
190a7f9e43a20ee90297ee565bcf7da6180254fa022bc06ff5736f2a556d6bbb.exe
Resource
win10v2004-20220901-en
General
-
Target
190a7f9e43a20ee90297ee565bcf7da6180254fa022bc06ff5736f2a556d6bbb
-
Size
112KB
-
MD5
660938e55d022b6088c8ddce4e897c90
-
SHA1
fca46041273e384d3558609e0ba0b86d4d64aeb2
-
SHA256
190a7f9e43a20ee90297ee565bcf7da6180254fa022bc06ff5736f2a556d6bbb
-
SHA512
5bace3dda5d04c5543da7dde19cb029bc9c616dc7c0c97947516fd61b5edd4dc40a7c5c23fcf741dbb18b16539c6d531e5090ce9a46e5670d153d864957dd03c
-
SSDEEP
1536:zX28J1p58jt31Eu7GdP61eLdFiu9sVPmQ0Ccsz2D8uydAjpFUc9B15Zi:zmop5yt31pyEYLLb9208udjpFV9B1ri
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
190a7f9e43a20ee90297ee565bcf7da6180254fa022bc06ff5736f2a556d6bbb.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bczwlja Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE