Behavioral task
behavioral1
Sample
4a959a20af30fbaeb5d33dbd1837ed2fb28b57b4b2fef93f9f928936893aa0d6.exe
Resource
win7-20220812-en
General
-
Target
4a959a20af30fbaeb5d33dbd1837ed2fb28b57b4b2fef93f9f928936893aa0d6
-
Size
106KB
-
MD5
8fd77d8516b20d917a4f18cb4be98f5d
-
SHA1
6fd696e5636b15c93cfee98f35627cb844e4509c
-
SHA256
4a959a20af30fbaeb5d33dbd1837ed2fb28b57b4b2fef93f9f928936893aa0d6
-
SHA512
b788c02388927f53b1233673a5b262f755b2c42587941ce34c07796012922c3df13987a3feb1e4378aa759747583386652d015e7d72b849adc937f168a11e50b
-
SSDEEP
1536:xvQBeOGtrYS3srx93UBWfwC6Ggnouy82F13w801ouAsG9ZoPEudlGGBwNyLDYe33:xhOmTsF93UYfwC6GIout03Fv9KdYGUgT
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
4a959a20af30fbaeb5d33dbd1837ed2fb28b57b4b2fef93f9f928936893aa0d6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE