Behavioral task
behavioral1
Sample
14fb09db511f27671d6e8849f2f7d9109fa0cab4e68ed0611e2b4475f021860e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14fb09db511f27671d6e8849f2f7d9109fa0cab4e68ed0611e2b4475f021860e.exe
Resource
win10v2004-20220901-en
General
-
Target
14fb09db511f27671d6e8849f2f7d9109fa0cab4e68ed0611e2b4475f021860e
-
Size
185KB
-
MD5
80c691b5448e03ac7450977addced304
-
SHA1
8c94a3f323a1cc39ebc5b7b5f9eed742492d7378
-
SHA256
14fb09db511f27671d6e8849f2f7d9109fa0cab4e68ed0611e2b4475f021860e
-
SHA512
19b3d6ea932509b1ebbe6662692b56d639d5205847c27e76c6f4b2ac8939cdcf7abd11b46a3375c07a40cbc0e14d0b7ad51ced983f0d44f897f65d9ee1d4e9f4
-
SSDEEP
3072:qmrAl/+GmkqdH/kFdrRYHjeM7yl1MXEZumGd/3wlTAVHtijZ:hUXmk0H/kbrip7yleS4wX
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
14fb09db511f27671d6e8849f2f7d9109fa0cab4e68ed0611e2b4475f021860e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 320KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 180KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE