Behavioral task
behavioral1
Sample
b855cca2e351a6ec876ccda1289943c0b741f69ec394ec8158ac98ca150341c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b855cca2e351a6ec876ccda1289943c0b741f69ec394ec8158ac98ca150341c4.exe
Resource
win10v2004-20220901-en
General
-
Target
b855cca2e351a6ec876ccda1289943c0b741f69ec394ec8158ac98ca150341c4
-
Size
64KB
-
MD5
9115c9c47ff05a1ec8bcd0e3593d3a7a
-
SHA1
6f589ed62d58097e73946b2a943856d42269f9d5
-
SHA256
b855cca2e351a6ec876ccda1289943c0b741f69ec394ec8158ac98ca150341c4
-
SHA512
8358b0d47952b8a89b821c5daabd7567611346a787a1104138d7ebe8215188dcfe7acfa8c2f00e67423953b3b8bcbd12502d603f0760c93cb1bb232584f712a9
-
SSDEEP
1536:0x3NKXXBtPoz6X9hPqpn8DeUUTEFzjc7b4:S9KXXBtPu0XPIn8iyF/cX4
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b855cca2e351a6ec876ccda1289943c0b741f69ec394ec8158ac98ca150341c4.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE