Behavioral task
behavioral1
Sample
d421f63bed136350c7a0e504341393d2311f518090f72a534de6c107b5bd4af7_dump_0x00400000.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d421f63bed136350c7a0e504341393d2311f518090f72a534de6c107b5bd4af7_dump_0x00400000.exe
Resource
win10v2004-20220812-en
General
-
Target
d421f63bed136350c7a0e504341393d2311f518090f72a534de6c107b5bd4af7_dump_0x00400000
-
Size
88KB
-
MD5
6a932cc12da77341b93734f7fe9a5cf9
-
SHA1
742773e23600eda4f178bd6b3d5dafba74ae293d
-
SHA256
6e58522c3e19214524734a4f9bdf803e006665a92f84614c0ea3944007945016
-
SHA512
10eadc076091d35d8a31a8041fc997ea559dd2739a1e7d59a416176e6f81fc653d772fd16d07b65b9862770e548c9257de283244c9cecbbb8ed348ff0eb54ded
-
SSDEEP
1536:ijcwy8jC/l7pvAan3ZcVGHxIsnXiYDC7pXzAO:ijxyH/l7pOGxxnGzA
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d421f63bed136350c7a0e504341393d2311f518090f72a534de6c107b5bd4af7_dump_0x00400000.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE