Behavioral task
behavioral1
Sample
4eb19b2cbcbc915ab0e4de8f540ca49b0b56966aeb419f3113dd98e265641d34.dll
Resource
win7-20221111-en
General
-
Target
4eb19b2cbcbc915ab0e4de8f540ca49b0b56966aeb419f3113dd98e265641d34
-
Size
137KB
-
MD5
445c3c6dfe0d82f7aa076e89ea7a1ee8
-
SHA1
7f26a2a3a6ad49c20e5dacf32ed455f720e8fe6f
-
SHA256
4eb19b2cbcbc915ab0e4de8f540ca49b0b56966aeb419f3113dd98e265641d34
-
SHA512
95e74b6af2a1bdc87765afa7bd98784c77bfa19d5f215c379501cdd059c79edc43c871eb97a7e0175c49c7226061ea712e2aa3a445858999c7d69dc01734cb1f
-
SSDEEP
3072:EjjE91LY/ECF9xiElbIl+tozLL6KIwSlXFF:EsMXbIl/vL6KQ1F
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4eb19b2cbcbc915ab0e4de8f540ca49b0b56966aeb419f3113dd98e265641d34.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE