Behavioral task
behavioral1
Sample
09b5a6cfcf7e54e39ebd7b9711f76095c9fec9a78adf7bf79f751547444afe2b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
09b5a6cfcf7e54e39ebd7b9711f76095c9fec9a78adf7bf79f751547444afe2b.exe
Resource
win10v2004-20220812-en
General
-
Target
09b5a6cfcf7e54e39ebd7b9711f76095c9fec9a78adf7bf79f751547444afe2b
-
Size
67KB
-
MD5
7d571d620c9c4d1d596e99d322bb8ab0
-
SHA1
01e8431544cdbdeec01de8293230b9fb4c46555b
-
SHA256
09b5a6cfcf7e54e39ebd7b9711f76095c9fec9a78adf7bf79f751547444afe2b
-
SHA512
35dab4141e24ccc0293c0571c3f9601751ced5337b0649cd1070f11b73ca39c9aaa596c48f09b3136e274f7c10c9f790a633ba4b703952564cde54e26a42af71
-
SSDEEP
768:42+vWXJxdeWCt47xFxrvJSZLULVE8qt46uoatetctMz:5QWHdeWCS7xD7ILU+Kswetcw
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Metasploit family
-
resource yara_rule sample upx
Files
-
09b5a6cfcf7e54e39ebd7b9711f76095c9fec9a78adf7bf79f751547444afe2b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE