Behavioral task
behavioral1
Sample
d4bb9cafc1aa5620184188efa03dd22664c279429e32795038362745a8afc91b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d4bb9cafc1aa5620184188efa03dd22664c279429e32795038362745a8afc91b.exe
Resource
win10v2004-20220901-en
General
-
Target
d4bb9cafc1aa5620184188efa03dd22664c279429e32795038362745a8afc91b
-
Size
247KB
-
MD5
41fca70839eabcdf66d7b6479727dad0
-
SHA1
354032da18fe1218299654bffa54a0f67f9f34ab
-
SHA256
d4bb9cafc1aa5620184188efa03dd22664c279429e32795038362745a8afc91b
-
SHA512
5527da4fb5f238d0e1dd69076690b5725b8eef0ebc9d15c8d04cdd07a6054349f573cb9ec0ccf357574fb7d7036426eefad0d5a466657a16c6214f1ba7ab2dbb
-
SSDEEP
6144:YuMJWy+qaHEQCcYfSBYJ2QChRcqESEgm6Anhc1kG6Evy:Y+ycUc6SBCdTSEgBAnhc1kG
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d4bb9cafc1aa5620184188efa03dd22664c279429e32795038362745a8afc91b.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 217KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE