Behavioral task
behavioral1
Sample
d05d66630e1d639c398795632ed7edbc425eb3277a4596f28e4c40d2b33c41a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d05d66630e1d639c398795632ed7edbc425eb3277a4596f28e4c40d2b33c41a3.exe
Resource
win10v2004-20220901-en
General
-
Target
d05d66630e1d639c398795632ed7edbc425eb3277a4596f28e4c40d2b33c41a3
-
Size
159KB
-
MD5
a093f9ac37e115772d261e887c9bfb70
-
SHA1
0137061edc47c566c8c880fe50d43d3e309f4287
-
SHA256
d05d66630e1d639c398795632ed7edbc425eb3277a4596f28e4c40d2b33c41a3
-
SHA512
4d8291d31ddcd49bd5c48c0c3842c585a5555aea4c274c8b32ed454f8fe962fb27c62a7848c39dc9a05cdd24606fc6b2a0f4858b478394d746a5b11560a2b907
-
SSDEEP
3072:yxTqpdA3f6QNf2IPO4DpmWpAsfYbTOBoefYi6a9k20tAvnkzkuI/TD3:02pdqfv2IPOGfXf5ovWvakjD
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d05d66630e1d639c398795632ed7edbc425eb3277a4596f28e4c40d2b33c41a3.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 53KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE