Behavioral task
behavioral1
Sample
e4d2a9d6f1336f7b9ed6787124e15dda0a5e37c1361d0f75a1308bf99208fbca.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4d2a9d6f1336f7b9ed6787124e15dda0a5e37c1361d0f75a1308bf99208fbca.exe
Resource
win10v2004-20220812-en
General
-
Target
e4d2a9d6f1336f7b9ed6787124e15dda0a5e37c1361d0f75a1308bf99208fbca
-
Size
667KB
-
MD5
2ec9e817685bf6c535a09df1896507ce
-
SHA1
175503b55e41200505e5dd436288042bd9d76943
-
SHA256
e4d2a9d6f1336f7b9ed6787124e15dda0a5e37c1361d0f75a1308bf99208fbca
-
SHA512
39cd98fad637091a84b76bd210b1c244a8a7dff2089f53a13b3f400eeaf76c3f533561c7fb03a5db392c67c5862936edb32ee11b59d75dfa00abbbc32337d8bc
-
SSDEEP
12288:yjkArEN249AyE/rbaMct4bO2/V30ZktGtYm9pRLYS0DzhT:lFE//Tct4bOs6W/i50D
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e4d2a9d6f1336f7b9ed6787124e15dda0a5e37c1361d0f75a1308bf99208fbca.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 452KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 263KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.2UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE