Behavioral task
behavioral1
Sample
dd67df06ae2c6c81239557bc8b176b173e1f8e78fb9463512d086a9a0c4a21f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd67df06ae2c6c81239557bc8b176b173e1f8e78fb9463512d086a9a0c4a21f6.exe
Resource
win10v2004-20220812-en
General
-
Target
dd67df06ae2c6c81239557bc8b176b173e1f8e78fb9463512d086a9a0c4a21f6
-
Size
91KB
-
MD5
63706406a0a243c739f15f4a110bf9f2
-
SHA1
ccfbdf558737a37fa0ea21fa2866b245b00bd3f8
-
SHA256
dd67df06ae2c6c81239557bc8b176b173e1f8e78fb9463512d086a9a0c4a21f6
-
SHA512
93f98f36e57d306903e78e46732db9cdd186fbf2ae7916b4e34ae47c225385d87af4212633260db5cf4326d5d991b1602638bf53cd16d5959ce542e5a38d39bf
-
SSDEEP
1536:0Y5QjE9xp1xB18pufIPkzxvWgcYCGbBRcb0WBPB9H7FPXiO5HSnouy8:00r9P1r7wPUO7ShiBl7FfiO5HKout
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
dd67df06ae2c6c81239557bc8b176b173e1f8e78fb9463512d086a9a0c4a21f6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 512KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE