Behavioral task
behavioral1
Sample
401b3c16950d215393812eff7960a8d372967c392d40f5084e8822c1e60b9b88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
401b3c16950d215393812eff7960a8d372967c392d40f5084e8822c1e60b9b88.exe
Resource
win10v2004-20220901-en
General
-
Target
401b3c16950d215393812eff7960a8d372967c392d40f5084e8822c1e60b9b88
-
Size
127KB
-
MD5
a18e8f479e7143c3b82f61980549bc29
-
SHA1
05e2b39e1451d0e684837f45c3df255317a4892c
-
SHA256
401b3c16950d215393812eff7960a8d372967c392d40f5084e8822c1e60b9b88
-
SHA512
ca8bce0fe7804b13ef789db88975a6623a56a446caf698962e76b372b321176c411a60c640e311fc374e5059601e3e00f3772712ce9d7c025a087eb3ee9931da
-
SSDEEP
1536:UI7WNoexo95ankLoVBTT8CZsGdS6b/j1gU6T/69:UfNGOlV5T8C6eDj1g29
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
401b3c16950d215393812eff7960a8d372967c392d40f5084e8822c1e60b9b88.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE