Behavioral task
behavioral1
Sample
de4019eacd19f691f37e4ea7cd2ee6840c3810227dc176795e41a4b9a1e24f4e.exe
Resource
win7-20220812-en
General
-
Target
de4019eacd19f691f37e4ea7cd2ee6840c3810227dc176795e41a4b9a1e24f4e
-
Size
111KB
-
MD5
79a2a0278211ef3e5275b75c34a061d0
-
SHA1
b869363a9492c20183a68e3a4d7bebd1c044b3e2
-
SHA256
de4019eacd19f691f37e4ea7cd2ee6840c3810227dc176795e41a4b9a1e24f4e
-
SHA512
717e6fcd045a2ffa7f12bdafe18956a38f1e22aa20899f63abe7bab72ac478443423398871b2488f13b16d5194d3b938f2ffd2c891c5f6901706cd6ecb0b8ef1
-
SSDEEP
3072:TROzoTq0+RO7IwnYGjb3/4s/gTA774ZxN+miUH:1kdNwBtb/oTA78Z
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
de4019eacd19f691f37e4ea7cd2ee6840c3810227dc176795e41a4b9a1e24f4e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE