Behavioral task
behavioral1
Sample
840bcb9393d458a070d59c6780c94dbba7d56d3acd6b07e8d700629ef5cfa8ed.dll
Resource
win7-20220812-en
General
-
Target
840bcb9393d458a070d59c6780c94dbba7d56d3acd6b07e8d700629ef5cfa8ed
-
Size
165KB
-
MD5
8433bd79aa78008e0c561653d93a193e
-
SHA1
4cd919de130d98096c7ca3f98ec1df4a96ccd2a7
-
SHA256
840bcb9393d458a070d59c6780c94dbba7d56d3acd6b07e8d700629ef5cfa8ed
-
SHA512
0cf372ba2dc41967c3da94b52417f51a0cbceff7aef7f95c1af2a3b263d009863df6abeff66a0acccc580d636735ab2cd9c93e849288593882c34d87aadddc86
-
SSDEEP
3072:Dmuz1eVJWC3bup5W7eFfJm6nM5BFVUHmfX7:quzgVp3g5W/5Omj
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
840bcb9393d458a070d59c6780c94dbba7d56d3acd6b07e8d700629ef5cfa8ed.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE