Behavioral task
behavioral1
Sample
ba81863420a5de2b988d2079e68adf7dede38150333398c15cd18b1dbba1a82a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba81863420a5de2b988d2079e68adf7dede38150333398c15cd18b1dbba1a82a.exe
Resource
win10v2004-20220901-en
General
-
Target
ba81863420a5de2b988d2079e68adf7dede38150333398c15cd18b1dbba1a82a
-
Size
396KB
-
MD5
74cd31a3bbb2eb1c371b5b3937d13a90
-
SHA1
6112219ae1252af1529d5d27614275e9bced60a1
-
SHA256
ba81863420a5de2b988d2079e68adf7dede38150333398c15cd18b1dbba1a82a
-
SHA512
326540ca19f45a99492c94f5622805728fa5d232e0ba966227d76ed425879b8612a499e21c8710fe660604c0c7f763915c906cbeb6f7b92a8b814a657be5d33f
-
SSDEEP
6144:wGzRxSVtp0l6whGfsKR+zkBpTaa5tJHYt4r:Dt0VPFfsKAkrbPlYGr
Malware Config
Signatures
Files
-
ba81863420a5de2b988d2079e68adf7dede38150333398c15cd18b1dbba1a82a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 796KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 153KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 408KB - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ