Behavioral task
behavioral1
Sample
132d414606f1f5e7cac7e643d0eee6a9dac12308c8de01a62957ef27edb5ce5e.exe
Resource
win7-20220901-en
General
-
Target
132d414606f1f5e7cac7e643d0eee6a9dac12308c8de01a62957ef27edb5ce5e
-
Size
329KB
-
MD5
a17b7542d85762dee7eff446aef08a5c
-
SHA1
865299e4cf5996c3719d757c5a3243a0cf773dac
-
SHA256
132d414606f1f5e7cac7e643d0eee6a9dac12308c8de01a62957ef27edb5ce5e
-
SHA512
e1951b5d89a1fec2045bf8deafacc8fa7b8d1e7b1c14159270e99c21b391f95791a0ee69db3622ead0e0d4f50a2b474829dee7e865328fc3b844a3ad7783650e
-
SSDEEP
6144:uuHIU3SCXOM31Gs48xmj0sFNJL+zoH2HAo6BqRVLr:5oUi831MjnpqoKMBEVH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
132d414606f1f5e7cac7e643d0eee6a9dac12308c8de01a62957ef27edb5ce5e.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 376KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 168KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1UPX1 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE