Behavioral task
behavioral1
Sample
852a42040bbc4dcdfc13d3c5a36451f54676e6af91ea466d074b03f6d9f761b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
852a42040bbc4dcdfc13d3c5a36451f54676e6af91ea466d074b03f6d9f761b1.exe
Resource
win10v2004-20220812-en
General
-
Target
852a42040bbc4dcdfc13d3c5a36451f54676e6af91ea466d074b03f6d9f761b1
-
Size
56KB
-
MD5
840413ae2733fb087328ff68061d7abb
-
SHA1
0c5a0c8e596cbbd927b103f01e6b5f7589e4ef98
-
SHA256
852a42040bbc4dcdfc13d3c5a36451f54676e6af91ea466d074b03f6d9f761b1
-
SHA512
6a2bb0042c644233067f8e8a2003833efcae3883376656ae850fbbd1a3872f38335745e0d9acb54bbcbd121906959b8d968eca11942ce2ad52dba4f4dce36221
-
SSDEEP
768:zQJ5RTiNdt+Yj7JmxThspX/6Z11vjU9ev9onvB6pQg6Nwh+c4nyM4efA6xqfZ:EJPG9XwZnrU0vE5MbWR4eI6qfZ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
852a42040bbc4dcdfc13d3c5a36451f54676e6af91ea466d074b03f6d9f761b1.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 72KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vgggrpj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE