Behavioral task
behavioral1
Sample
d4c9859362df9982adc688eaba24386e0fd6a0055be21663e5de938dc663c5e6.exe
Resource
win7-20220812-en
General
-
Target
d4c9859362df9982adc688eaba24386e0fd6a0055be21663e5de938dc663c5e6
-
Size
1.4MB
-
MD5
1e8ea2ac92f977390fd31eb72dc46560
-
SHA1
fdd24ce46decdfebb52ca2ace6ea2310030ffb76
-
SHA256
d4c9859362df9982adc688eaba24386e0fd6a0055be21663e5de938dc663c5e6
-
SHA512
b66908268563c324f6e6b6166c1d1b78c7e4960ddaa147f1cf6c0fc738721fd08e1ce5012260054d7171a3a846e20eff620fe9b6b728e92d41fd6023f7764ebe
-
SSDEEP
24576:VnHV1bCtx3lOtLwKCkVNuR9bFpUelM+fGjfXIa7wot3fOLVq2VumOpq0k:VHV1Cxs2KlVN+rpYD1wCOBlVyq
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d4c9859362df9982adc688eaba24386e0fd6a0055be21663e5de938dc663c5e6.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 2.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE