Behavioral task
behavioral1
Sample
1aa3af217b25e435c035f3d0e4d7f3c46b7bc763882c81ce6b62f945599f2686.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1aa3af217b25e435c035f3d0e4d7f3c46b7bc763882c81ce6b62f945599f2686.exe
Resource
win10v2004-20220812-en
General
-
Target
1aa3af217b25e435c035f3d0e4d7f3c46b7bc763882c81ce6b62f945599f2686
-
Size
2.2MB
-
MD5
01e4a0fb114dc38c6f87584011fbe055
-
SHA1
b161cb03571761c9ebbf6454aa53ec34fdd6a5a9
-
SHA256
1aa3af217b25e435c035f3d0e4d7f3c46b7bc763882c81ce6b62f945599f2686
-
SHA512
94fda36698586aa17e5e31afd8d307f204c0514d22afcb10e4a993d7ee8cc4abea10ee390e98919c4ce457f9dc3dafb55fa6db280143dc6f4750bce3bce65606
-
SSDEEP
49152:CZjacNwjC0MP9sN0A8mEHYwtsCAcsW0PjF3S3o9BpTxAP:cjcMPeNyJHY7CAcQZSiBpm
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
1aa3af217b25e435c035f3d0e4d7f3c46b7bc763882c81ce6b62f945599f2686.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 4KB - Virtual size: 1.0MB
IMAGE_SCN_MEM_READ
VPR_DEMO Size: 700KB - Virtual size: 700KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VPR_DEMO Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
VPR_DEMO Size: 4KB - Virtual size: 4KB
IMAGE_SCN_MEM_READ
VPR_DEMO Size: 16KB - Virtual size: 16KB
IMAGE_SCN_MEM_READ