Behavioral task
behavioral1
Sample
feb4d1c5e3f2b9c2e5112f6b912181a513967e4cb2e5778aa927c361f4bb7d05.exe
Resource
win7-20220812-en
General
-
Target
feb4d1c5e3f2b9c2e5112f6b912181a513967e4cb2e5778aa927c361f4bb7d05
-
Size
111KB
-
MD5
085bdea848ca568f5f449fbbbcfe7470
-
SHA1
2f2d970bc77659bc7fffa6d28f9ebaa7b6eb8def
-
SHA256
feb4d1c5e3f2b9c2e5112f6b912181a513967e4cb2e5778aa927c361f4bb7d05
-
SHA512
70f0d1515817b9176886e254f988f15adeb6547c22314ec4d65ecf0fb732f373c4d6111e563beb890188da58a363288604b3d2db04a1e39765f8b635eb0db155
-
SSDEEP
1536:4+hzRsibKplyXTq8OGRnsPFG+RODTb7MXL5uXZnzEwNNfmSk9R0H8Uvog6PHGqXk:TROzoTq0+RO7IwnYlSMGH8UvoNPpUq
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
feb4d1c5e3f2b9c2e5112f6b912181a513967e4cb2e5778aa927c361f4bb7d05.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE