Behavioral task
behavioral1
Sample
20a043a4cfaf14d86a405a9048e7b6b1340f3537dd49fd9f5cd2844faa5d3f17.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
20a043a4cfaf14d86a405a9048e7b6b1340f3537dd49fd9f5cd2844faa5d3f17.exe
Resource
win10v2004-20220812-en
General
-
Target
20a043a4cfaf14d86a405a9048e7b6b1340f3537dd49fd9f5cd2844faa5d3f17
-
Size
150KB
-
MD5
a2b1003a547bf13f1960c01ff51989a0
-
SHA1
42ee4df4f12cc7d65748e5e6279f2998a0ecd0c1
-
SHA256
20a043a4cfaf14d86a405a9048e7b6b1340f3537dd49fd9f5cd2844faa5d3f17
-
SHA512
6b5cad7e874f563b27472a6760319d268f6db2d8fef4bd05857377d9cd98615b15891cc6146b828fd2b91e9c42a9578618e2e9560ed482682b93198dbfb8e6d4
-
SSDEEP
3072:EfjaBhAkgLDleyryoA4J08CXGmwMflSr9yzoI7h+aS1GH:8lkgL5dLfJ08CX2ul+yzo0naGH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
20a043a4cfaf14d86a405a9048e7b6b1340f3537dd49fd9f5cd2844faa5d3f17.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE