Behavioral task
behavioral1
Sample
54ba21c67b0d0be5540a1a829e350f82933f7dbb84f2b513078628e223c57b5d.dll
Resource
win7-20220812-en
General
-
Target
54ba21c67b0d0be5540a1a829e350f82933f7dbb84f2b513078628e223c57b5d
-
Size
170KB
-
MD5
a2119850c1a2f8559d553bf03d34ded9
-
SHA1
f149b4f56c173876dea514a59220465a84642c81
-
SHA256
54ba21c67b0d0be5540a1a829e350f82933f7dbb84f2b513078628e223c57b5d
-
SHA512
854269c8badf3bab99dc3fc3d8e106d5f5c71686a85ef6b44755e1b9fbbd6210d18fad78cbf5b7b0e91ad877c9efc3e21cb3cc007e03bdc9a3e23bd6cff15c68
-
SSDEEP
3072:Xmuz1eVJWC3bup5W7eFAZm6nM5BFVUHmfXM1K:2uzgVp3g5We5OmyK
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
54ba21c67b0d0be5540a1a829e350f82933f7dbb84f2b513078628e223c57b5d.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE