Behavioral task
behavioral1
Sample
19b50bf02c6a04fa09af04f878a02caa4fa99f917215a704c12b5bbd63b1ae3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19b50bf02c6a04fa09af04f878a02caa4fa99f917215a704c12b5bbd63b1ae3d.exe
Resource
win10v2004-20220812-en
General
-
Target
19b50bf02c6a04fa09af04f878a02caa4fa99f917215a704c12b5bbd63b1ae3d
-
Size
378KB
-
MD5
8029ef337a0e1e2925d9c3d203b3d0f0
-
SHA1
724ca3753cf2016f5a432f01caf9a26fc72b628d
-
SHA256
19b50bf02c6a04fa09af04f878a02caa4fa99f917215a704c12b5bbd63b1ae3d
-
SHA512
d51d776810c1f45ec10e5a5c93224b860c59cb58f132e3a18f6de9ddf889c96f5b4468306f113ed8418e5274a9cac58ad7e8b59b098a3760adc5a708bd119332
-
SSDEEP
6144:glZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76foiv3OZ4Q2qrQnsNBR:gHLUMuiv9RgfSjAzRtw3C2qsn2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
19b50bf02c6a04fa09af04f878a02caa4fa99f917215a704c12b5bbd63b1ae3d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 508KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE