Behavioral task
behavioral1
Sample
6e6cf7bd56fdbc21b3ca2fe57bdf275ab814d3e9f6282bb6d0f14b2811b5f9d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e6cf7bd56fdbc21b3ca2fe57bdf275ab814d3e9f6282bb6d0f14b2811b5f9d4.exe
Resource
win10v2004-20220812-en
General
-
Target
6e6cf7bd56fdbc21b3ca2fe57bdf275ab814d3e9f6282bb6d0f14b2811b5f9d4
-
Size
438KB
-
MD5
61d3eeabfe646f535c1ec9dfb313505e
-
SHA1
4c4171b34ce51b956b7671d9b7896d60111776e3
-
SHA256
6e6cf7bd56fdbc21b3ca2fe57bdf275ab814d3e9f6282bb6d0f14b2811b5f9d4
-
SHA512
2c64bc74051e67884e9d69d4a53c0cc37ee056f90d00895c4f71aac7bc65225e4d8b591db8ac553a51a28c71c4959a05aab4adb4372ac9ed886aaeb98e34ab06
-
SSDEEP
12288:AuveLlVhGhwwBU+Wsg6WqPRGS5VYaP5pzkIocatSOSSKi:AuGZGhwwBxdbXRTl5+4at5hKi
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6e6cf7bd56fdbc21b3ca2fe57bdf275ab814d3e9f6282bb6d0f14b2811b5f9d4.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 320KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yvs Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE