Behavioral task
behavioral1
Sample
49853f14bdfcd1265bbb71d4e1193cfd69a7341891fd6a9a5130b68b380b151c_dump_0x00400000.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49853f14bdfcd1265bbb71d4e1193cfd69a7341891fd6a9a5130b68b380b151c_dump_0x00400000.exe
Resource
win10v2004-20220812-en
General
-
Target
49853f14bdfcd1265bbb71d4e1193cfd69a7341891fd6a9a5130b68b380b151c_dump_0x00400000
-
Size
328KB
-
MD5
1057cffe21bb716342ec1303dc4969e3
-
SHA1
93989d48af638ade886701881420877b0d9a23aa
-
SHA256
51a78cfabc3dc00a22257517241fcd3f39c8e610cce9d5b475a5bbee4f5c1075
-
SHA512
4745cdcca297754ff1475baba69b4fd5543a7951210294b7fef103d672471108bfff0b73283330a12f3a372f804ed10737f8f88e59eef51b461650b706e389df
-
SSDEEP
6144:kHpp6ZEmJSr/49JSptGGsX5MGY7idvxHlcaAy0iWYOcG4BDhnxD28ixv7uDphYHR:4uYQJUkGsXsvArgygf
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
49853f14bdfcd1265bbb71d4e1193cfd69a7341891fd6a9a5130b68b380b151c_dump_0x00400000.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 128KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 188KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE