Behavioral task
behavioral1
Sample
13f74600e01d740ba94c398e117b08b57660b299e71c2b59636821e4e338023c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13f74600e01d740ba94c398e117b08b57660b299e71c2b59636821e4e338023c.exe
Resource
win10v2004-20220901-en
General
-
Target
13f74600e01d740ba94c398e117b08b57660b299e71c2b59636821e4e338023c
-
Size
31KB
-
MD5
7a3b5b2320e47f59ff0c87f790fdd300
-
SHA1
696305f4bd4c6f4a26ed21cb135fae1fab522073
-
SHA256
13f74600e01d740ba94c398e117b08b57660b299e71c2b59636821e4e338023c
-
SHA512
934a4fdd02b97f3f9585b127268d5035d348c5fac49ba00cd4aa00fa8463c20767b29e898eda61364cb4ec2d312ebfe30cf87af1db95ca8bfe0ef957fd52a7cb
-
SSDEEP
384:xVxVKEqgAX/2R6Nv/4GJVl7V0dtVEEkSXug:HxMqR6Nv/4Qz50dtVrkw
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
13f74600e01d740ba94c398e117b08b57660b299e71c2b59636821e4e338023c.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE