Behavioral task
behavioral1
Sample
eedf11fdf38f0427b5ad02c411401c073f5ad38e17570c47033569823e139b51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eedf11fdf38f0427b5ad02c411401c073f5ad38e17570c47033569823e139b51.exe
Resource
win10v2004-20220901-en
General
-
Target
eedf11fdf38f0427b5ad02c411401c073f5ad38e17570c47033569823e139b51
-
Size
470KB
-
MD5
836faced0ea9135f9ba99ecf9340bd30
-
SHA1
c8fc6988ecb1662217677e95f55d33b751c054ea
-
SHA256
eedf11fdf38f0427b5ad02c411401c073f5ad38e17570c47033569823e139b51
-
SHA512
10adbb9927508860b8238f216bef7aca66f771f967d91acc57bf9129ef04868c3404ef68fec751842b320956223b3964e4d9924590edc1593c121480ede108c4
-
SSDEEP
12288:p8nWjEgA9jATPgfk6i/vTTJdhFGiHMo0w9froS:qWjEj9jCgwJdpb0w
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
eedf11fdf38f0427b5ad02c411401c073f5ad38e17570c47033569823e139b51.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ofczncb Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE