Behavioral task
behavioral1
Sample
4bd3a2e161e6e2c4273e33629751105cd5e26fbb407cdb2e5420c1f4e817c874.exe
Resource
win7-20221111-en
General
-
Target
4bd3a2e161e6e2c4273e33629751105cd5e26fbb407cdb2e5420c1f4e817c874
-
Size
58KB
-
MD5
3b316784bb21bc7421f0af78485725f0
-
SHA1
ab2ae568c165cc0ce31a77f60b6d9db47b64bdc4
-
SHA256
4bd3a2e161e6e2c4273e33629751105cd5e26fbb407cdb2e5420c1f4e817c874
-
SHA512
f7d54ddc3e143b295ec0fab718820ac56395f664213e502ab09a3ff8e377a72513951d0aaa074489a60e281400fe12cbea95ca240a1811c68cf8b8dafeffeb34
-
SSDEEP
768:8lT5LRwivTwNjZbA1bvRvEaZyzDPtP6vBd+V6znlp0LIej08QGPL4vzZq2o9W7G6:yvspev1pCP6v/uXj0fGCq2iW7z
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4bd3a2e161e6e2c4273e33629751105cd5e26fbb407cdb2e5420c1f4e817c874.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�)��u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE