Behavioral task
behavioral1
Sample
e64403bc3a940c4d6cc45f85fd973449db98f814ce9ccc3aa882324ecf5960c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e64403bc3a940c4d6cc45f85fd973449db98f814ce9ccc3aa882324ecf5960c0.exe
Resource
win10v2004-20220812-en
General
-
Target
e64403bc3a940c4d6cc45f85fd973449db98f814ce9ccc3aa882324ecf5960c0
-
Size
204KB
-
MD5
d23095d3dda556ea68fcf0babff6c8f3
-
SHA1
70a7ab73b3a95d776e8c433c8cf973025afe9201
-
SHA256
e64403bc3a940c4d6cc45f85fd973449db98f814ce9ccc3aa882324ecf5960c0
-
SHA512
df371a91d4d400ca064dc58c393f1efba30dee396b20b8b41df0b482f08a161c1229dd0c08c03ce5b4b629e24dc4ddd4a3c89aaa59cafb5505b7db938ef49095
-
SSDEEP
6144:ZBsiCr48KuF/6O9M5S7PgNKbYySI+Gp+v+eW0bamg7Ly7:/sd48FF5d45gc+v0br2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e64403bc3a940c4d6cc45f85fd973449db98f814ce9ccc3aa882324ecf5960c0.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 340KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 189KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xobop Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE