Behavioral task
behavioral1
Sample
fa4f52e2654efa12d8ac368185d97c2f4c3a57a4bd1e439daa3ceb129ea0e37a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa4f52e2654efa12d8ac368185d97c2f4c3a57a4bd1e439daa3ceb129ea0e37a.exe
Resource
win10v2004-20220812-en
General
-
Target
fa4f52e2654efa12d8ac368185d97c2f4c3a57a4bd1e439daa3ceb129ea0e37a
-
Size
529KB
-
MD5
0da76b648057b4aaa5d151bee6b46150
-
SHA1
07a52c57d3fe7c5d401f9191304888a4daab2226
-
SHA256
fa4f52e2654efa12d8ac368185d97c2f4c3a57a4bd1e439daa3ceb129ea0e37a
-
SHA512
14d8a4ec9f6b2271b7e10ba53dbe62f6a80afc613ac1530f23b96150ad5a3e34895dee7113ee13e9080d7030e48c1ce04c5dc41d582dec46bcbd0ab5880e099a
-
SSDEEP
6144:QlZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76l8/T+n:QHLUMuiv9RgfSjAzRtyCo
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
fa4f52e2654efa12d8ac368185d97c2f4c3a57a4bd1e439daa3ceb129ea0e37a.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 452KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 253KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gsybpgo Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qxtbbhs Size: 29KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE