Behavioral task
behavioral1
Sample
d57980cf661ee669e71eb50a0f06019e8f519d212fc71907f37bbe1d9b4eddfd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d57980cf661ee669e71eb50a0f06019e8f519d212fc71907f37bbe1d9b4eddfd.exe
Resource
win10v2004-20220812-en
General
-
Target
d57980cf661ee669e71eb50a0f06019e8f519d212fc71907f37bbe1d9b4eddfd
-
Size
638KB
-
MD5
0e2c559240034863fb3febbcf6d76312
-
SHA1
45da16198a050f0435088c08850f7adef195b8b0
-
SHA256
d57980cf661ee669e71eb50a0f06019e8f519d212fc71907f37bbe1d9b4eddfd
-
SHA512
b0067f211788664d224d3664fa8c9061022cadfdc2b6990da1e292741b8387be47cdf63bc54993c3e4585f2992a844f340309e6d7b452fb8de8d152fbeb71b13
-
SSDEEP
6144:9vZ2iKiZ/QAKVfiROzkViZwc0W/1vNuMqTp/CelAaWjSZ/nWnKCXreO:d7wVfiRuqPW/dgMqIHdjSFWnKCX
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d57980cf661ee669e71eb50a0f06019e8f519d212fc71907f37bbe1d9b4eddfd.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 376KB - Virtual size: 376KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 168KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE