Behavioral task
behavioral1
Sample
0ddd57ccb4ecceab7b4ffa0649aa956c47943db18321ad87efb01b79fc922e7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ddd57ccb4ecceab7b4ffa0649aa956c47943db18321ad87efb01b79fc922e7a.exe
Resource
win10v2004-20220812-en
General
-
Target
0ddd57ccb4ecceab7b4ffa0649aa956c47943db18321ad87efb01b79fc922e7a
-
Size
102KB
-
MD5
06991ea42ac36c0ef17321889dcb7838
-
SHA1
e0a1fa12e1cfaf864d886d855b72524df3b929bf
-
SHA256
0ddd57ccb4ecceab7b4ffa0649aa956c47943db18321ad87efb01b79fc922e7a
-
SHA512
b470e336564f39ba3c7e1ae1225cc10731ac644a842abcc9aaaba010345cbde35a970331c3ae522ad3e16c1e2759290d46ca6454c0e79bfc3e7fb1af0b35f155
-
SSDEEP
3072:2aFJB4sF0HetkLqwdsNpTO3DqNb9extMSslracF:2uBJOeq+9NRZb8xGfRacF
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
0ddd57ccb4ecceab7b4ffa0649aa956c47943db18321ad87efb01b79fc922e7a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 224KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.. Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE