Behavioral task
behavioral1
Sample
93d8968941939bb85b0a264359ea017a8597037676572fb708cfcf61072768e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93d8968941939bb85b0a264359ea017a8597037676572fb708cfcf61072768e0.exe
Resource
win10v2004-20220812-en
General
-
Target
93d8968941939bb85b0a264359ea017a8597037676572fb708cfcf61072768e0
-
Size
434KB
-
MD5
0ab8656d97be5a1faae9bccf43db1ab9
-
SHA1
12ee65f51c766f44ddb3364e50068ab1d5c039cd
-
SHA256
93d8968941939bb85b0a264359ea017a8597037676572fb708cfcf61072768e0
-
SHA512
6084df7e99c025c3efcf730bda73c08e9188920b497c2056f216a278d86b6ea5185b849bf2422e44d83bfc3a3c4659d5ed1c5e482d4c122c277a76ec2b9048c1
-
SSDEEP
12288:FnI+8RacPyk99FOsfEQNSMAxPZNLXqs76P:Fnh8j6KTvfEQNS/xPZRR76P
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
93d8968941939bb85b0a264359ea017a8597037676572fb708cfcf61072768e0.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 376KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 223KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 201KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE