Behavioral task
behavioral1
Sample
b766aaaae0a7fe330b8c6b9a54fa7bffd27f2dc2e7e0e3adf28d6f658cf8841a.exe
Resource
win7-20220812-en
General
-
Target
b766aaaae0a7fe330b8c6b9a54fa7bffd27f2dc2e7e0e3adf28d6f658cf8841a
-
Size
111KB
-
MD5
0fcb20e0548750e09d213b61e206a5d0
-
SHA1
0e84d0356460549a49a66e81d5515982befee3f7
-
SHA256
b766aaaae0a7fe330b8c6b9a54fa7bffd27f2dc2e7e0e3adf28d6f658cf8841a
-
SHA512
cd6ba311bb8025cf87f77a47e4768a73b26c2a0b9c9e1eda142c27c28981c3fa59e5acb35c64e40512cdb0f3afaefc20997033bcb5b8ad2b0c360bd4307c5972
-
SSDEEP
1536:4+hzRsibKplyXTq8OGRnsPFG+RODTb7MXL5uXZnzEEV8ROu1vExVVx89b2sIGaC4:TROzoTq0+RO7IwnYXsuBmkMGa
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
b766aaaae0a7fe330b8c6b9a54fa7bffd27f2dc2e7e0e3adf28d6f658cf8841a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE