Behavioral task
behavioral1
Sample
a6059ba10a80efb78bbe475cf8d3eab6e0d149ae2c840e1204323a01d5a5d19d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6059ba10a80efb78bbe475cf8d3eab6e0d149ae2c840e1204323a01d5a5d19d.exe
Resource
win10v2004-20220901-en
General
-
Target
a6059ba10a80efb78bbe475cf8d3eab6e0d149ae2c840e1204323a01d5a5d19d
-
Size
505KB
-
MD5
80036a365d6874811e4a359abbb503e0
-
SHA1
bad2db01f2c24221782386cb748c343bdf368e62
-
SHA256
a6059ba10a80efb78bbe475cf8d3eab6e0d149ae2c840e1204323a01d5a5d19d
-
SHA512
4e106d4d4a026c987b28b6063576b51c1c40293f9da223b09111b1649b64ac71861b24c6df80bd6b84f4129b2ed8521bd2d4f54e6f672675cdf64d32256e7ea5
-
SSDEEP
12288:d1PO8MeQh81uhNmq+jhfgK29t784d+zB3WbQ:fPO8MeQS143+jhfQ9t7848z
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
a6059ba10a80efb78bbe475cf8d3eab6e0d149ae2c840e1204323a01d5a5d19d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 428KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 265KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.T� Size: 230KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE