Behavioral task
behavioral1
Sample
61dc666ddbdfb53b84aa70b0dc1ae6604cb04b8dfcc0d8dabad1d2c704d0979b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61dc666ddbdfb53b84aa70b0dc1ae6604cb04b8dfcc0d8dabad1d2c704d0979b.exe
Resource
win10v2004-20220812-en
General
-
Target
61dc666ddbdfb53b84aa70b0dc1ae6604cb04b8dfcc0d8dabad1d2c704d0979b
-
Size
376KB
-
MD5
93c385cc9816289b0151f2b1dcbbe939
-
SHA1
7d115e217c9cee8501e50032005a6ea3c5b37ad7
-
SHA256
61dc666ddbdfb53b84aa70b0dc1ae6604cb04b8dfcc0d8dabad1d2c704d0979b
-
SHA512
f36c66a7c530647622cc545182eee0d6fb470863c0e19e693052a8be18f3c904c925aa52dce449b5074ea0965aa469b6b1bb69f5ab26c62ea9b2f32880e5ad65
-
SSDEEP
1536:htpshtpssEylzvOLWxqCDL71QEBCTV5UIHx76rpgQ3w7j6jtfiejqo:5sOKxquq7VR7S+30aGqo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
61dc666ddbdfb53b84aa70b0dc1ae6604cb04b8dfcc0d8dabad1d2c704d0979b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.newIID Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE