Behavioral task
behavioral1
Sample
4bb9aad0d37776bb4fb9bf44b30d4173c675218032320357c6e495a278c14274.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4bb9aad0d37776bb4fb9bf44b30d4173c675218032320357c6e495a278c14274.exe
Resource
win10v2004-20220812-en
General
-
Target
4bb9aad0d37776bb4fb9bf44b30d4173c675218032320357c6e495a278c14274
-
Size
132KB
-
MD5
f225f2a3db40ae8c78906748ccdc55c4
-
SHA1
2db558bb9cb345e234a8c3438d51269f60476723
-
SHA256
4bb9aad0d37776bb4fb9bf44b30d4173c675218032320357c6e495a278c14274
-
SHA512
5f35881dcdbd3c153faca22a73ec46ebbe1a3ebee941d149e19f5fd919188d57a6552128679f239b9175b9312ea4a3078ab5df23c0387f633f696be1fe7ce27e
-
SSDEEP
3072:yROzoTq0+RO7IwnYlQdPTW6QSBcX0PcECJttL3:MkdNwB+QdPf8xL3
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4bb9aad0d37776bb4fb9bf44b30d4173c675218032320357c6e495a278c14274.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 52KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE