Behavioral task
behavioral1
Sample
35e74c28beb4ecf6edb0170785b71b8b46c3ab2275088be731b04475c2aa96b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35e74c28beb4ecf6edb0170785b71b8b46c3ab2275088be731b04475c2aa96b2.exe
Resource
win10v2004-20221111-en
General
-
Target
35e74c28beb4ecf6edb0170785b71b8b46c3ab2275088be731b04475c2aa96b2
-
Size
108KB
-
MD5
36e46830309f9c0666f27e3bb352199a
-
SHA1
e8268408f0bb7c7129faef435687ce1d58b48926
-
SHA256
35e74c28beb4ecf6edb0170785b71b8b46c3ab2275088be731b04475c2aa96b2
-
SHA512
f56cff0c9d0a9b53de444cd47d8ecf404b7ab94bdb35b453b4764be45a6a791ed984d8859efac79acd71b2e4836fb21eb36b44b08625d6f6a4f01fcd33bbb976
-
SSDEEP
3072:Coy8j7VnNdrPHaSekwi+mW+2iCCo5qfout:S8jZ7rvaU3+mWr/j5qfoS
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
35e74c28beb4ecf6edb0170785b71b8b46c3ab2275088be731b04475c2aa96b2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 204KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE