Behavioral task
behavioral1
Sample
3e56245df4bbc077c958e02d5fe6de63c7d997e9b3f2234aa0b87a2d75a01255.exe
Resource
win7-20221111-en
General
-
Target
3e56245df4bbc077c958e02d5fe6de63c7d997e9b3f2234aa0b87a2d75a01255
-
Size
99KB
-
MD5
35f9e9327bc14a6dc76ad20933d7163c
-
SHA1
71b96eeb4205c52f53d0c8ad83c99b5e3a60032a
-
SHA256
3e56245df4bbc077c958e02d5fe6de63c7d997e9b3f2234aa0b87a2d75a01255
-
SHA512
c0aff5e469244cd3be123e75cdc51dd669da92c54d6074fa8d4b652617d0b621e809135d40f898e9c59d821ccaa85b7813f5be8df6363a6f1c77888875e0f626
-
SSDEEP
1536:ef3tItHjl1GmEhZGkS5jDNVlkubUz+mAjGEo+VJHm195uxf2iH1oAbrG27V:y3tO1YZOXOxz+mAEWHmpUN1o+TV
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
3e56245df4bbc077c958e02d5fe6de63c7d997e9b3f2234aa0b87a2d75a01255.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 172KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sozokfs Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE