Behavioral task
behavioral1
Sample
96f36583081187709de73c5201da79d5a845373090d811e9bf13bf3c01d7f2c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96f36583081187709de73c5201da79d5a845373090d811e9bf13bf3c01d7f2c7.exe
Resource
win10v2004-20220901-en
General
-
Target
96f36583081187709de73c5201da79d5a845373090d811e9bf13bf3c01d7f2c7
-
Size
788KB
-
MD5
6a94d8a8fd9781c73797bc63cb514eb0
-
SHA1
be80fab871365b7370c1b232930bb836ad0ec0b4
-
SHA256
96f36583081187709de73c5201da79d5a845373090d811e9bf13bf3c01d7f2c7
-
SHA512
923cae03028f06fdfd3f42790c9572e79313c452d6fb34961efb53e8baadbf6568bbdedad6a999f50ec1161d751e269717db171665a4a1de5c53c3e84a2f8abd
-
SSDEEP
12288:3TB09SkkNXKgor5IWk3rkP8dl9Gl54jUHwJulU2uD6zt393B+InUmc5JwvMiYip8:8ScgU5oAkbm54YnFPNwQ7S
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
96f36583081187709de73c5201da79d5a845373090d811e9bf13bf3c01d7f2c7.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 444KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE