Behavioral task
behavioral1
Sample
7bab0abd4f991852d416a216de88223b5eaa841802caed913c5d45f8fee3c442.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7bab0abd4f991852d416a216de88223b5eaa841802caed913c5d45f8fee3c442.exe
Resource
win10v2004-20220812-en
General
-
Target
7bab0abd4f991852d416a216de88223b5eaa841802caed913c5d45f8fee3c442
-
Size
328KB
-
MD5
1301284b0aaa240d536b31b25e6c2361
-
SHA1
e46ff917c1d9134c9b77ca458d0eb48fcee67673
-
SHA256
7bab0abd4f991852d416a216de88223b5eaa841802caed913c5d45f8fee3c442
-
SHA512
90da48ea9c9bf01ec16a02043f373bfd51fa886fa7cbd4d19414d54065853efe62f9f72252f6a872d44db7a33352de12503a03fb39273dc8d8965d8711baaab4
-
SSDEEP
6144:WYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UO85B:WSNC80I+cR3R03VseuO85B
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
7bab0abd4f991852d416a216de88223b5eaa841802caed913c5d45f8fee3c442.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 380KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RUPX1 Size: 80KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE