Behavioral task
behavioral1
Sample
662872db0104fed3498156f98cac4a8ca8035a66b3def61bf8333e70508fc6e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
662872db0104fed3498156f98cac4a8ca8035a66b3def61bf8333e70508fc6e2.exe
Resource
win10v2004-20220901-en
General
-
Target
662872db0104fed3498156f98cac4a8ca8035a66b3def61bf8333e70508fc6e2
-
Size
1.2MB
-
MD5
26e985793993eb9d43a48fde7edbb98f
-
SHA1
ad0c79f8d6a2d36bca7b44cc8172625fc1bbdd6d
-
SHA256
662872db0104fed3498156f98cac4a8ca8035a66b3def61bf8333e70508fc6e2
-
SHA512
3bd21359d81bd7d2b1148c4191fce359dc72ba620a2abbfc0f5f87c8ebb26094928657a0936b9e4de746a1ffd73394455328eb40b539dd2f577a60b9b5f6ed86
-
SSDEEP
24576:3uhaterQZb+md4wmXeZJ8NI8DerQZb+md4wmA7p:YAerQZbd288DerQZbd2up
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
662872db0104fed3498156f98cac4a8ca8035a66b3def61bf8333e70508fc6e2.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE