Behavioral task
behavioral1
Sample
53de4d107743828decd71ad10e2e50a8fa0becfae106ad8d3c08a48e4447de3e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
53de4d107743828decd71ad10e2e50a8fa0becfae106ad8d3c08a48e4447de3e.exe
Resource
win10v2004-20220812-en
General
-
Target
53de4d107743828decd71ad10e2e50a8fa0becfae106ad8d3c08a48e4447de3e
-
Size
64KB
-
MD5
850b45bd02719a23c89495471a225b9e
-
SHA1
aa8b4692d6eae746ac90072d6a794331bdd7d7e2
-
SHA256
53de4d107743828decd71ad10e2e50a8fa0becfae106ad8d3c08a48e4447de3e
-
SHA512
b052f28287576bd4b03fba704fdca062cedd495e910d2ec2c01586d1a9b63ab7f848e8ffe000ab91790b18218de41cd48cf39b66381d8b9bbf33c484c5ba74d6
-
SSDEEP
1536:Zgp2ZUpdi92i9+233kCF9dI3LPAXOXln6ELB4EFP3P829V8S4Dhg0fn2J6Z2r:ZgQWi92i9+233kCF9dI3LPAXOXln6EL9
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
53de4d107743828decd71ad10e2e50a8fa0becfae106ad8d3c08a48e4447de3e.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 288KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE