Behavioral task
behavioral1
Sample
76ef19f111c2d1ad8a5ea227da405b2423e5a1ca09309332533edbe46fd02900.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76ef19f111c2d1ad8a5ea227da405b2423e5a1ca09309332533edbe46fd02900.exe
Resource
win10v2004-20220812-en
General
-
Target
76ef19f111c2d1ad8a5ea227da405b2423e5a1ca09309332533edbe46fd02900
-
Size
20KB
-
MD5
6b85bf50ee09c9abf4520a92e3dd4670
-
SHA1
f9110129e3ac9e26a1039f7ad2abc37b2565df3e
-
SHA256
76ef19f111c2d1ad8a5ea227da405b2423e5a1ca09309332533edbe46fd02900
-
SHA512
1b597519d9d296895a4737ddf79f6e6cbbe5839b580dea7e178cee6147a7b172b2c3a96e3b7ed1a947eec104633808e8e5faaa717823979b6f4472ad481b818b
-
SSDEEP
192:eoaV34oeS3dtrJEGhb8JDFnmnG88DKbTur370hdsk:eoIDnLb8JDFwbRbw370A
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
76ef19f111c2d1ad8a5ea227da405b2423e5a1ca09309332533edbe46fd02900.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE