Behavioral task
behavioral1
Sample
4a10828a6d22c216303621fca5b48088c5cbd698f7d48fce480c8dbc7e09ed7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a10828a6d22c216303621fca5b48088c5cbd698f7d48fce480c8dbc7e09ed7d.exe
Resource
win10v2004-20220812-en
General
-
Target
4a10828a6d22c216303621fca5b48088c5cbd698f7d48fce480c8dbc7e09ed7d
-
Size
20KB
-
MD5
1221c68bdc674ca58574932c3b8e8df0
-
SHA1
9469eb86a47a48d445fe1c811e9263ce9db2301b
-
SHA256
4a10828a6d22c216303621fca5b48088c5cbd698f7d48fce480c8dbc7e09ed7d
-
SHA512
9dba05cd32a2d89b7b8cbced67e0ed1e76cbf2654c1a5f2ccd4c508efc3bb8524ca6baef4fab307f7d645a6c3af4f74b37d0403c91c1f013db3948a0f0fd12a5
-
SSDEEP
192:ZoaV34oeS3dtrJEGhb8JDFnmnG88DKbTur370hdsk:ZoIDnLb8JDFwbRbw370A
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4a10828a6d22c216303621fca5b48088c5cbd698f7d48fce480c8dbc7e09ed7d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE