Behavioral task
behavioral1
Sample
41e59a60716a1da5b44869ebe27d6c0b2ed289930dd3adc622cb3ae314a43df2.exe
Resource
win7-20220812-en
General
-
Target
41e59a60716a1da5b44869ebe27d6c0b2ed289930dd3adc622cb3ae314a43df2
-
Size
272KB
-
MD5
3695b3c1e7fa3e8b81f8bb82e655ba41
-
SHA1
0ad37edf83255c34b89fab0aaa112e9bb2967cc4
-
SHA256
41e59a60716a1da5b44869ebe27d6c0b2ed289930dd3adc622cb3ae314a43df2
-
SHA512
82164d394342b022605e7246dd2d9efe0266829dc7299d004c1051eba3fb5bd9d744d220f0b1a1adf79e244535d401f565855c3d25cdd9cfb59ba2b46120f142
-
SSDEEP
6144:9PLkVO8A1X2og0tEHH45Y0KTIVaTycTVDNe4jAfQP2JqjsR:qMJ1X2og0MHGKT3RRwcAf22EQR
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
41e59a60716a1da5b44869ebe27d6c0b2ed289930dd3adc622cb3ae314a43df2.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 348KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 193KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.LUPX1 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE