Behavioral task
behavioral1
Sample
bee8e783f431a2d7b90c450efdc6d67df68e54cc7a3364559dd1bfd9f6357c3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bee8e783f431a2d7b90c450efdc6d67df68e54cc7a3364559dd1bfd9f6357c3d.exe
Resource
win10v2004-20220812-en
General
-
Target
bee8e783f431a2d7b90c450efdc6d67df68e54cc7a3364559dd1bfd9f6357c3d
-
Size
20KB
-
MD5
15f0e8be0c04ca1c2797278a57772580
-
SHA1
83f7b68290db34652614f51dad9118ec2ca1ad2c
-
SHA256
bee8e783f431a2d7b90c450efdc6d67df68e54cc7a3364559dd1bfd9f6357c3d
-
SHA512
ae992118cc8f405021f81a7631901d7195333395286ca2eac8ae550378e134b597cd98c8a0e264b3cfceac2296f8c7f5ead21be02f47f38338452f07e63d3480
-
SSDEEP
192:uoaV34oeS3dtrJEGhb8JDFnmnG88DKbTur370hdsk:uoIDnLb8JDFwbRbw370A
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
bee8e783f431a2d7b90c450efdc6d67df68e54cc7a3364559dd1bfd9f6357c3d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE