Behavioral task
behavioral1
Sample
dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5.exe
Resource
win10v2004-20220812-en
General
-
Target
dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5
-
Size
739KB
-
MD5
15d3258e0a610cd824b1f51d9297d640
-
SHA1
478065a1b38bab5785d8ed5e531ef399bc2633a8
-
SHA256
dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5
-
SHA512
59c1e735e66392accef8d89dcb81d4e9960027c6820ed9e0c848d749738d650e998ab6939520c0df713f7026acf2afa7cabac128fcd98ce4b868c39edc60f1d9
-
SSDEEP
12288:DSYr8EeBHl8irqPEWGwfz/NQt0lmmFRxRIMmSN3FUoAjc:Dn7kFLrqV7z7m2RxRIMmC3Cc
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
dc20b38fa55aa52580125dab374b46217136a532c805d7aefcfdbce14d3dfad5.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 412KB - Virtual size: 412KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 316KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE