Behavioral task
behavioral1
Sample
4acabfd413e8db5aed9353b8dd5cbdb5f46d6de38e302449b36f29131baf9f35.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4acabfd413e8db5aed9353b8dd5cbdb5f46d6de38e302449b36f29131baf9f35.dll
Resource
win10v2004-20220901-en
General
-
Target
4acabfd413e8db5aed9353b8dd5cbdb5f46d6de38e302449b36f29131baf9f35
-
Size
81KB
-
MD5
a0eed3a6f9df79d5d29c3b35e4b22a20
-
SHA1
4b85cd3f1bc6d1c36badcc3780dcd0f994542a56
-
SHA256
4acabfd413e8db5aed9353b8dd5cbdb5f46d6de38e302449b36f29131baf9f35
-
SHA512
7b8dd272f8de11df7d307ae8960d7dbbb269c05fdae425573332c533084570eed0b94f028460fc48c80bb769aa5ffcc1eb9023a3fcb66359da1206acd0f7988b
-
SSDEEP
1536:2tH4Wk48FlmvyxP4c0vJ9otcUoaiZvwT32Y44tJyIa5U2PZ4I2PtPTbu:cHj8oyd4c0vJ9otToxOT3223m/PuIcTb
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4acabfd413e8db5aed9353b8dd5cbdb5f46d6de38e302449b36f29131baf9f35.dll windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE