Behavioral task
behavioral1
Sample
e4b51140f38673a8552110bacda1dbaac757317cb01363a27cd50a5ad29c3251.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4b51140f38673a8552110bacda1dbaac757317cb01363a27cd50a5ad29c3251.exe
Resource
win10v2004-20220812-en
General
-
Target
e4b51140f38673a8552110bacda1dbaac757317cb01363a27cd50a5ad29c3251
-
Size
788KB
-
MD5
0b8ad008fce5d3ce4901f73f7dca08b0
-
SHA1
0aef395a6d956b89e4f5fa3968da1fffff6c5952
-
SHA256
e4b51140f38673a8552110bacda1dbaac757317cb01363a27cd50a5ad29c3251
-
SHA512
ab6597511ede33589a9e2aea408917d9c8bbf6d287701c1d7b1756a2217247eb583a1ba93fede7c083c2e9f2975c9909edb4ece6bd2b88dd02b6bd45c63f67b1
-
SSDEEP
12288:3TB09SkkNXKgor5IWk3rkP8dl9Gl54jUHwJulU2AoEAKWBkzJP3PCodVSEh:8ScgU5oAkbm54YnmAozRPCyS6
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e4b51140f38673a8552110bacda1dbaac757317cb01363a27cd50a5ad29c3251.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 444KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE