Behavioral task
behavioral1
Sample
20aef3374ba28010409de647aae699b697e245207b0ed3731be060e84b725638.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20aef3374ba28010409de647aae699b697e245207b0ed3731be060e84b725638.exe
Resource
win10v2004-20220901-en
General
-
Target
20aef3374ba28010409de647aae699b697e245207b0ed3731be060e84b725638
-
Size
37KB
-
MD5
2e810a42d9ecac3f6e11eed1681b0430
-
SHA1
93ea7fd302f8d225d1b3ea68bb1e611d541290f6
-
SHA256
20aef3374ba28010409de647aae699b697e245207b0ed3731be060e84b725638
-
SHA512
d4cd0397d8fd18f8d4a86f2762727406831ae08e7731606846a7cfb27414e56830457df1458935cf76049044219e929576b33434f054fc6f849ac9e9e8c615dc
-
SSDEEP
384:o5P6d+tTZcrUAPkjMZlm5P6d+tTZca/r4uMu:o964fAPdZM964hr
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
20aef3374ba28010409de647aae699b697e245207b0ed3731be060e84b725638.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pb Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE