Behavioral task
behavioral1
Sample
1a7e1ced868788172fdc1abd4fcf25f6d93791df40fb2506d575c85f908a7159.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a7e1ced868788172fdc1abd4fcf25f6d93791df40fb2506d575c85f908a7159.exe
Resource
win10v2004-20221111-en
General
-
Target
1a7e1ced868788172fdc1abd4fcf25f6d93791df40fb2506d575c85f908a7159
-
Size
20KB
-
MD5
12b60bb017670294897f94aa6cb02890
-
SHA1
9c69c1e3b0b1b472cabec787bee02c373cdd17fb
-
SHA256
1a7e1ced868788172fdc1abd4fcf25f6d93791df40fb2506d575c85f908a7159
-
SHA512
23ab4c7879c8f1f218e3e5110ed54b72f9507f0c8dc83b745dda73e4a3cd05d40cb795acb65eb125de572a13839475e04c97992027c850c762a9a8a4f70eb841
-
SSDEEP
192:roaV34oeS3dtrJEGhb8JDFnmnG88DKbTur370hdsk:roIDnLb8JDFwbRbw370A
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1a7e1ced868788172fdc1abd4fcf25f6d93791df40fb2506d575c85f908a7159.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE