Behavioral task
behavioral1
Sample
d3af0a46c6856383c1d374db9324bac9d126d03d6107571a6213d55e71930e88.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d3af0a46c6856383c1d374db9324bac9d126d03d6107571a6213d55e71930e88.exe
Resource
win10v2004-20220812-en
General
-
Target
d3af0a46c6856383c1d374db9324bac9d126d03d6107571a6213d55e71930e88
-
Size
289KB
-
MD5
1c24e3be24bf6a2a2e5a8e0300a3dcde
-
SHA1
446584f091ff9dfd1058910ace901edb52bc650b
-
SHA256
d3af0a46c6856383c1d374db9324bac9d126d03d6107571a6213d55e71930e88
-
SHA512
7d3b5a2f7bcb1df5f9d912f53f4af220d57aab56f1356216452fbc73098584b4a0d7fa40622625282511e46a7a2071183ea51b8672143da7a66b5f2a53656120
-
SSDEEP
6144:pchQ+n3/4YIJ8m1MxUyRzoVOBlYQflIGV:pch3nP4BJTM6++OBlYERV
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
d3af0a46c6856383c1d374db9324bac9d126d03d6107571a6213d55e71930e88.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UPX Size: 241KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE