Behavioral task
behavioral1
Sample
f2047e3b7802aa90a1a2fda2fbd080cafdbb41203fe4a24f0fd14e5d0ac7a804.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2047e3b7802aa90a1a2fda2fbd080cafdbb41203fe4a24f0fd14e5d0ac7a804.exe
Resource
win10v2004-20220812-en
General
-
Target
f2047e3b7802aa90a1a2fda2fbd080cafdbb41203fe4a24f0fd14e5d0ac7a804
-
Size
192KB
-
MD5
03bd768cdb9e42132866ac0a3c2911a2
-
SHA1
44d6255acd2cd708bce65c73d89c80d4f90bcc3c
-
SHA256
f2047e3b7802aa90a1a2fda2fbd080cafdbb41203fe4a24f0fd14e5d0ac7a804
-
SHA512
c6f087b6fc998bcb5fa97f489643600cd45a1230f50b475f51992cabd0c4c4bcc63c3c6ec8c618b53b70bc61f8dfb263a9d6466c8ad9b25c9b2b6c08b8ad89bc
-
SSDEEP
6144:5NlSs8vLFeZYJad8P3QAioSpqb1rrcdpsyD80BPYl8QEihCH:5N8LFeZYJWMQboSgdisyY/1CH
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
f2047e3b7802aa90a1a2fda2fbd080cafdbb41203fe4a24f0fd14e5d0ac7a804.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_SYSTEM
Sections
UPX0 Size: - Virtual size: 200KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ultra Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ