Behavioral task
behavioral1
Sample
6babe6dc757e0a1e0fe4e7e3d1c20287d1bb6a6eeb6cce833cc464f66d18ab80.exe
Resource
win7-20220812-en
General
-
Target
6babe6dc757e0a1e0fe4e7e3d1c20287d1bb6a6eeb6cce833cc464f66d18ab80
-
Size
261KB
-
MD5
908b889000b3509e74266e8a2eecc949
-
SHA1
40a533d6d8de28fb952f21b92194de928b227376
-
SHA256
6babe6dc757e0a1e0fe4e7e3d1c20287d1bb6a6eeb6cce833cc464f66d18ab80
-
SHA512
630998cc33ee82e6fee7dabcd5e2dc716a78888f72eb697abbe145c85232a6f0fb43e1640a6afe953268aee869dffa19f5ad2884b22ee344b02c50331511d5bd
-
SSDEEP
6144:D+WmS9LsamiC3vX5D2yOVZZ+g59LfUTa52:5mUYUY2Z/cw9LsF
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
6babe6dc757e0a1e0fe4e7e3d1c20287d1bb6a6eeb6cce833cc464f66d18ab80.exe windows x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 147KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX0 Size: 104KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE